jeremylong / DependencyCheck

OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
https://owasp.org/www-project-dependency-check/
Apache License 2.0
6.26k stars 1.25k forks source link

dependencycheck update fails using openJDK #561

Closed Phone911 closed 7 years ago

Phone911 commented 7 years ago

When performing dependencycheck (version 143) updateonly processing using the openJDK version 1.8.0_101 we get the following failure:

[INFO] Checking for updates [ERROR] IO Exception: Connection reset [ERROR] IO Exception: Connection reset [WARN] Unable to download the NVD CVE data; the results may not include the most recent CPE/CVEs from the NVD. [INFO] If you are behind a proxy you may need to configure dependency-check to use the proxy. [ERROR] Unable to download the NVD CVE data.

When we run the same script using Java HotSpot (Oracle Java) version 1.8.0_74 the update process works:

[INFO] Checking for updates [INFO] Download Started for NVD CVE - Modified [INFO] Download Complete for NVD CVE - Modified (675 ms) [INFO] Processing Started for NVD CVE - Modified [INFO] Processing Complete for NVD CVE - Modified (15251 ms) [INFO] Begin database maintenance. [INFO] End database maintenance. [INFO] Check for updates complete (19503 ms)

I am including log files from both runs.

dc-openjdk.txt dc-hotspot.txt

biancajiang commented 7 years ago

+1.

jeremylong commented 7 years ago

1.4.3 works for me (well, 1.4.4-SNAPSHOT - but there is no difference in the download code). Which is unfortunate for both you and me as I want to be able to help solve this problem. Attached are two runs using openjdk and ibm jdk and in both the download works correctly:

ibm_jdk.txt open_jdk.txt

Is there any chance you are behind a proxy? Could we try adding -Djavax.net.debug=all and providing the log?

Phone911 commented 7 years ago

Both these runs were from the same machine with the same proxy. We also tried running on a different proxy and got the same results. I would think this is evidence that the proxy is not the problem.

Gary Burchett

Tel: +1 (919) 531-6995 Mobile: +1 (919) 413-3146

From: Jeremy Long [mailto:notifications@github.com] Sent: Friday, September 16, 2016 11:39 AM To: jeremylong/DependencyCheck DependencyCheck@noreply.github.com Cc: Gary Burchett Gary.Burchett@sas.com; Author author@noreply.github.com Subject: Re: [jeremylong/DependencyCheck] dependencycheck update fails using openJDK (#561)

1.4.3 works for me (well, 1.4.4-SNAPSHOT - but there is no difference in the download code). Which is unfortunate for both you and me as I want to be able to help solve this problem. Attached are two runs using openjdk and ibm jdk and in both the download works correctly:

ibm_jdk.txthttps://github.com/jeremylong/DependencyCheck/files/477186/ibm_jdk.txt open_jdk.txthttps://github.com/jeremylong/DependencyCheck/files/477187/open_jdk.txt

Is there any chance you are behind a proxy? Could we try adding -Djavax.net.debug=all and providing the log?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHubhttps://github.com/jeremylong/DependencyCheck/issues/561#issuecomment-247633390, or mute the threadhttps://github.com/notifications/unsubscribe-auth/AGdX2ptq7_-B30orwshyVrOzteDnrIPiks5qqrgQgaJpZM4J92lL.

jeremylong commented 7 years ago

Could you try adding -Djavax.net.debug=all and providing the log?

biancajiang commented 7 years ago

@jeremylong I found my silly problem.

I forgot to push the changes from 1.4.3 release to my branch I used for build! So my build was run w/o the fix. Once the build is aligned with 1.4.3, it passes! Sorry about the churns!

My local mac machine seems to have some JVM conflict I'm still looking.

FYI, I do not use proxy.

Phone911 commented 7 years ago

Here are runs with the two javas. I did an export JAVAOPTS=”-Djavax.net.debug=all” and ran the two scripts.

Gary Burchett

Tel: +1 (919) 531-6995 Mobile: +1 (919) 413-3146

From: Jeremy Long [mailto:notifications@github.com] Sent: Friday, September 16, 2016 1:55 PM To: jeremylong/DependencyCheck DependencyCheck@noreply.github.com Cc: Gary Burchett Gary.Burchett@sas.com; Author author@noreply.github.com Subject: Re: [jeremylong/DependencyCheck] dependencycheck update fails using openJDK (#561)

Could you try adding -Djavax.net.debug=all and providing the log?

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHubhttps://github.com/jeremylong/DependencyCheck/issues/561#issuecomment-247665355, or mute the threadhttps://github.com/notifications/unsubscribe-auth/AGdX2h_LVYW93LtYTEi8jeDy2BPkYsvNks5qqtfjgaJpZM4J92lL.

2016-09-16 15:37:32,469 org.owasp.dependencycheck.utils.Settings:486 DEBUG - Properties updated via merge:

data.driver_path='/usr/share/java/mysql-connector-java.jar' cve.url-2.0.modified='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz' cve.check.validforhours='0' cve.startyear='2002' data.version='3.0' analyzer.cocoapods.enabled='true' cve.url-1.2.base='https://nvd.nist.gov/download/nvdcve-%d.xml.gz' cve.url-2.0.base='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-%d.xml.gz' application.version='1.4.3' data.connection_string='jdbc:mysql://localhost:3306/dependencycheck' analyzer.archive.enabled='true' analyzer.ruby.gemspec.enabled='true' analyzer.assembly.enabled='true' analyzer.jar.enabled='true' analyzer.python.distribution.enabled='true' analyzer.cmake.enabled='true' analyzer.node.package.enabled='true' data.password='*****' cpe.url='http://static.nvd.nist.gov/feeds/xml/cpe/dictionary/official-cpe-dictionary_v2.3.xml.gz' downloader.quick.query.timestamp='true' application.name='Dependency-Check Core' engine.version.url='http://jeremylong.github.io/DependencyCheck/current.txt' analyzer.central.url='http://search.maven.org/solrsearch/select' data.user='dcuser' data.driver_name='com.mysql.jdbc.Driver' analyzer.swift.package.manager.enabled='true' cve.cpe.startswith.filter='cpe:/a:' max.download.threads='3' data.file_name='dc.h2.db' analyzer.experimental.enabled='false' analyzer.nexus.proxy='true' archive.scan.depth='3' analyzer.openssl.enabled='true' analyzer.composer.lock.enabled='true' analyzer.central.enabled='true' data.directory='[JAR]/data' cve.url.modified.validfordays='7' analyzer.nuspec.enabled='true' analyzer.nexus.enabled='false' cve.url-1.2.modified='https://nvd.nist.gov/download/nvdcve-Modified.xml.gz' analyzer.autoconf.enabled='true' cpe.validfordays='30' analyzer.nexus.url='https://repository.sonatype.org/service/local/' autoupdate='true' analyzer.python.package.enabled='true'

2016-09-16 15:37:32,476 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: data.directory='/opt/owasp/dependency-check/data' 2016-09-16 15:37:32,477 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: autoupdate='true' 2016-09-16 15:37:32,478 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.experimental.enabled='false' 2016-09-16 15:37:32,478 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.jar.enabled='true' 2016-09-16 15:37:32,478 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.archive.enabled='true' 2016-09-16 15:37:32,478 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.distribution.enabled='true' 2016-09-16 15:37:32,479 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.package.enabled='true' 2016-09-16 15:37:32,479 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.autoconf.enabled='true' 2016-09-16 15:37:32,479 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.cmake.enabled='true' 2016-09-16 15:37:32,479 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nuspec.enabled='true' 2016-09-16 15:37:32,479 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.assembly.enabled='true' 2016-09-16 15:37:32,480 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.bundle.audit.enabled='true' 2016-09-16 15:37:32,480 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.openssl.enabled='true' 2016-09-16 15:37:32,480 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.composer.lock.enabled='true' 2016-09-16 15:37:32,480 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.node.package.enabled='true' 2016-09-16 15:37:32,480 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.ruby.gemspec.enabled='true' 2016-09-16 15:37:32,481 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.central.enabled='true' 2016-09-16 15:37:32,481 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.enabled='true' 2016-09-16 15:37:32,481 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.proxy='true' 2016-09-16 15:37:32,487 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:108 DEBUG - Loading driver: com.mysql.jdbc.Driver 2016-09-16 15:37:32,487 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:112 DEBUG - Loading driver from: /usr/share/java/mysql-connector-java.jar 2016-09-16 15:37:32,497 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:144 DEBUG - Loading database connection 2016-09-16 15:37:32,497 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:145 DEBUG - Connection String: jdbc:mysql://localhost:3306/dependencycheck 2016-09-16 15:37:32,497 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:146 DEBUG - Database User: dcuser 2016-09-16 15:37:32,764 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Archive Analyzer 2016-09-16 15:37:32,765 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer File Name Analyzer 2016-09-16 15:37:32,767 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Jar Analyzer 2016-09-16 15:37:32,768 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Hint Analyzer 2016-09-16 15:37:32,770 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer CPE Analyzer 2016-09-16 15:37:32,772 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer False Positive Analyzer 2016-09-16 15:37:32,773 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Cpe Suppression Analyzer 2016-09-16 15:37:32,774 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Dependency Bundling Analyzer 2016-09-16 15:37:32,774 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer NVD CVE Analyzer 2016-09-16 15:37:32,775 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Vulnerability Suppression Analyzer 2016-09-16 15:37:32,775 org.owasp.dependencycheck.analyzer.CentralAnalyzer:112 DEBUG - Enabling the Central analyzer 2016-09-16 15:37:32,776 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Central Analyzer 2016-09-16 15:37:32,776 org.owasp.dependencycheck.analyzer.NexusAnalyzer:118 DEBUG - Nexus analyzer disabled, using Central instead 2016-09-16 15:37:32,776 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nexus Analyzer 2016-09-16 15:37:32,777 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nuspec Analyzer 2016-09-16 15:37:32,778 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Assembly Analyzer 2016-09-16 15:37:32,791 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer OpenSSL Source Analyzer 2016-09-16 15:37:32,797 org.owasp.dependencycheck.Engine:486 INFO - Checking for updates 2016-09-16 15:37:32,822 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:37:32,839 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:37:32,869 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-16 15:37:33,910 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2002.xml.gz 2016-09-16 15:37:34,463 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2003.xml.gz 2016-09-16 15:37:35,061 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2004.xml.gz 2016-09-16 15:37:35,645 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2005.xml.gz 2016-09-16 15:37:36,220 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2006.xml.gz 2016-09-16 15:37:36,795 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2007.xml.gz 2016-09-16 15:37:37,365 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2008.xml.gz 2016-09-16 15:37:37,914 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2009.xml.gz 2016-09-16 15:37:38,476 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2010.xml.gz 2016-09-16 15:37:39,054 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2011.xml.gz 2016-09-16 15:37:39,611 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2012.xml.gz 2016-09-16 15:37:40,166 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2013.xml.gz 2016-09-16 15:37:40,704 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2014.xml.gz 2016-09-16 15:37:41,273 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2015.xml.gz 2016-09-16 15:37:41,930 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2016.xml.gz 2016-09-16 15:37:43,186 org.owasp.dependencycheck.data.update.nvd.DownloadTask:167 INFO - Download Started for NVD CVE - Modified 2016-09-16 15:37:43,187 org.owasp.dependencycheck.utils.Downloader:114 DEBUG - Attempting download of https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-16 15:37:44,468 org.owasp.dependencycheck.data.update.nvd.DownloadTask:173 WARN - Download Failed for NVD CVE - Modified Some CVEs may not be reported. 2016-09-16 15:37:44,469 org.owasp.dependencycheck.data.update.nvd.DownloadTask:175 INFO - If you are behind a proxy you may need to configure dependency-check to use the proxy. 2016-09-16 15:37:44,473 org.owasp.dependencycheck.data.update.nvd.DownloadTask:178 DEBUG - org.owasp.dependencycheck.utils.DownloadFailedException: Error saving 'https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz' to file '/tmp/dctemp/cveModified_4281030454578347620.xml' Connection Timeout: 10000 Encoding: null

at org.owasp.dependencycheck.utils.Downloader.fetchFile(Downloader.java:181)
at org.owasp.dependencycheck.utils.Downloader.fetchFile(Downloader.java:78)
at org.owasp.dependencycheck.data.update.nvd.DownloadTask.call(DownloadTask.java:170)
at org.owasp.dependencycheck.data.update.nvd.DownloadTask.call(DownloadTask.java:45)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)

Caused by: java.io.FileNotFoundException: /tmp/dctemp/cveModified_4281030454578347620.xml (No such file or directory) at java.io.FileOutputStream.open0(Native Method) at java.io.FileOutputStream.open(FileOutputStream.java:270) at java.io.FileOutputStream.(FileOutputStream.java:213) at java.io.FileOutputStream.(FileOutputStream.java:162) at org.owasp.dependencycheck.utils.Downloader.fetchFile(Downloader.java:170) ... 7 common frames omitted 2016-09-16 15:37:44,474 org.owasp.dependencycheck.data.update.NvdCveUpdater:208 DEBUG - Thread was interrupted during download 2016-09-16 15:37:44,481 org.owasp.dependencycheck.App:146 ERROR - The download was interrupted; unable to complete the update 2016-09-16 15:37:44,483 org.owasp.dependencycheck.App:69 DEBUG - Exit code: -8 2016-09-16 15:42:01,375 org.owasp.dependencycheck.utils.Settings:486 DEBUG - Properties updated via merge:

data.driver_path='/usr/share/java/mysql-connector-java.jar' cve.url-2.0.modified='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz' cve.check.validforhours='0' cve.startyear='2002' data.version='3.0' analyzer.cocoapods.enabled='true' cve.url-1.2.base='https://nvd.nist.gov/download/nvdcve-%d.xml.gz' cve.url-2.0.base='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-%d.xml.gz' application.version='1.4.3' data.connection_string='jdbc:mysql://localhost:3306/dependencycheck' analyzer.archive.enabled='true' analyzer.ruby.gemspec.enabled='true' analyzer.assembly.enabled='true' analyzer.jar.enabled='true' analyzer.python.distribution.enabled='true' analyzer.cmake.enabled='true' analyzer.node.package.enabled='true' data.password='*****' cpe.url='http://static.nvd.nist.gov/feeds/xml/cpe/dictionary/official-cpe-dictionary_v2.3.xml.gz' downloader.quick.query.timestamp='true' application.name='Dependency-Check Core' engine.version.url='http://jeremylong.github.io/DependencyCheck/current.txt' analyzer.central.url='http://search.maven.org/solrsearch/select' data.user='dcuser' data.driver_name='com.mysql.jdbc.Driver' analyzer.swift.package.manager.enabled='true' cve.cpe.startswith.filter='cpe:/a:' max.download.threads='3' data.file_name='dc.h2.db' analyzer.experimental.enabled='false' analyzer.nexus.proxy='true' archive.scan.depth='3' analyzer.openssl.enabled='true' analyzer.composer.lock.enabled='true' analyzer.central.enabled='true' data.directory='[JAR]/data' cve.url.modified.validfordays='7' analyzer.nuspec.enabled='true' analyzer.nexus.enabled='false' cve.url-1.2.modified='https://nvd.nist.gov/download/nvdcve-Modified.xml.gz' analyzer.autoconf.enabled='true' cpe.validfordays='30' analyzer.nexus.url='https://repository.sonatype.org/service/local/' autoupdate='true' analyzer.python.package.enabled='true'

2016-09-16 15:42:01,381 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: data.directory='/opt/owasp/dependency-check/data' 2016-09-16 15:42:01,383 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: autoupdate='true' 2016-09-16 15:42:01,383 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.experimental.enabled='false' 2016-09-16 15:42:01,384 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.jar.enabled='true' 2016-09-16 15:42:01,384 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.archive.enabled='true' 2016-09-16 15:42:01,385 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.distribution.enabled='true' 2016-09-16 15:42:01,385 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.package.enabled='true' 2016-09-16 15:42:01,386 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.autoconf.enabled='true' 2016-09-16 15:42:01,386 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.cmake.enabled='true' 2016-09-16 15:42:01,386 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nuspec.enabled='true' 2016-09-16 15:42:01,387 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.assembly.enabled='true' 2016-09-16 15:42:01,387 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.bundle.audit.enabled='true' 2016-09-16 15:42:01,387 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.openssl.enabled='true' 2016-09-16 15:42:01,388 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.composer.lock.enabled='true' 2016-09-16 15:42:01,388 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.node.package.enabled='true' 2016-09-16 15:42:01,388 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.ruby.gemspec.enabled='true' 2016-09-16 15:42:01,389 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.central.enabled='true' 2016-09-16 15:42:01,389 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.enabled='true' 2016-09-16 15:42:01,389 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.proxy='true' 2016-09-16 15:42:01,397 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:108 DEBUG - Loading driver: com.mysql.jdbc.Driver 2016-09-16 15:42:01,397 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:112 DEBUG - Loading driver from: /usr/share/java/mysql-connector-java.jar 2016-09-16 15:42:01,416 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:144 DEBUG - Loading database connection 2016-09-16 15:42:01,417 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:145 DEBUG - Connection String: jdbc:mysql://localhost:3306/dependencycheck 2016-09-16 15:42:01,417 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:146 DEBUG - Database User: dcuser 2016-09-16 15:42:01,729 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Archive Analyzer 2016-09-16 15:42:01,730 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer File Name Analyzer 2016-09-16 15:42:01,733 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Jar Analyzer 2016-09-16 15:42:01,734 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Hint Analyzer 2016-09-16 15:42:01,736 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer CPE Analyzer 2016-09-16 15:42:01,738 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer False Positive Analyzer 2016-09-16 15:42:01,739 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Cpe Suppression Analyzer 2016-09-16 15:42:01,741 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Dependency Bundling Analyzer 2016-09-16 15:42:01,741 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer NVD CVE Analyzer 2016-09-16 15:42:01,742 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Vulnerability Suppression Analyzer 2016-09-16 15:42:01,742 org.owasp.dependencycheck.analyzer.CentralAnalyzer:112 DEBUG - Enabling the Central analyzer 2016-09-16 15:42:01,743 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Central Analyzer 2016-09-16 15:42:01,743 org.owasp.dependencycheck.analyzer.NexusAnalyzer:118 DEBUG - Nexus analyzer disabled, using Central instead 2016-09-16 15:42:01,743 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nexus Analyzer 2016-09-16 15:42:01,744 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nuspec Analyzer 2016-09-16 15:42:01,746 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Assembly Analyzer 2016-09-16 15:42:01,764 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer OpenSSL Source Analyzer 2016-09-16 15:42:01,773 org.owasp.dependencycheck.Engine:486 INFO - Checking for updates 2016-09-16 15:42:01,798 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:42:01,824 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:42:01,858 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-16 15:42:02,984 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2002.xml.gz 2016-09-16 15:42:03,676 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2003.xml.gz 2016-09-16 15:42:04,344 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2004.xml.gz 2016-09-16 15:42:04,979 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2005.xml.gz 2016-09-16 15:42:05,627 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2006.xml.gz 2016-09-16 15:42:06,275 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2007.xml.gz 2016-09-16 15:42:06,917 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2008.xml.gz 2016-09-16 15:42:07,554 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2009.xml.gz 2016-09-16 15:42:09,305 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2010.xml.gz 2016-09-16 15:42:10,100 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2011.xml.gz 2016-09-16 15:42:10,911 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2012.xml.gz 2016-09-16 15:42:12,083 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2013.xml.gz 2016-09-16 15:42:12,913 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2014.xml.gz 2016-09-16 15:42:13,672 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2015.xml.gz 2016-09-16 15:42:15,216 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2016.xml.gz 2016-09-16 15:42:15,842 org.owasp.dependencycheck.data.update.nvd.DownloadTask:167 INFO - Download Started for NVD CVE - Modified 2016-09-16 15:42:15,842 org.owasp.dependencycheck.utils.Downloader:114 DEBUG - Attempting download of https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-16 15:42:18,767 org.owasp.dependencycheck.utils.Downloader:176 DEBUG - Download of https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz complete 2016-09-16 15:42:18,768 org.owasp.dependencycheck.utils.Downloader:114 DEBUG - Attempting download of https://nvd.nist.gov/download/nvdcve-Modified.xml.gz 2016-09-16 15:42:21,084 org.owasp.dependencycheck.utils.Downloader:176 DEBUG - Download of https://nvd.nist.gov/download/nvdcve-Modified.xml.gz complete 2016-09-16 15:42:21,120 org.owasp.dependencycheck.data.update.nvd.DownloadTask:188 INFO - Download Complete for NVD CVE - Modified (5278 ms) 2016-09-16 15:42:21,123 org.owasp.dependencycheck.data.update.nvd.ProcessTask:159 INFO - Processing Started for NVD CVE - Modified 2016-09-16 15:42:22,709 org.owasp.dependencycheck.data.nvdcve.CveDB:176 DEBUG - Entering finalize 2016-09-16 15:42:33,367 org.owasp.dependencycheck.data.update.nvd.DownloadTask:210 DEBUG - Failed to delete first temporary file /tmp/dctemp/cve_1_2_Modified_1978449827314028136.xml 2016-09-16 15:42:33,369 org.owasp.dependencycheck.data.update.nvd.ProcessTask:182 INFO - Processing Complete for NVD CVE - Modified (12245 ms) 2016-09-16 15:42:33,371 org.owasp.dependencycheck.data.update.NvdCveUpdater:236 INFO - Begin database maintenance. 2016-09-16 15:42:34,005 org.owasp.dependencycheck.data.update.NvdCveUpdater:238 INFO - End database maintenance. 2016-09-16 15:42:34,021 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:42:34,023 org.owasp.dependencycheck.data.update.EngineVersionCheck:104 DEBUG - Begin Engine Version Check 2016-09-16 15:42:34,023 org.owasp.dependencycheck.data.update.EngineVersionCheck:110 DEBUG - Last checked: 1471600816480 2016-09-16 15:42:34,023 org.owasp.dependencycheck.data.update.EngineVersionCheck:111 DEBUG - Now: 1474054954023 2016-09-16 15:42:34,023 org.owasp.dependencycheck.data.update.EngineVersionCheck:112 DEBUG - Current version: 1.4.3 2016-09-16 15:42:34,024 org.owasp.dependencycheck.data.update.EngineVersionCheck:171 DEBUG - Upgrade not needed 2016-09-16 15:42:34,025 org.owasp.dependencycheck.Engine:494 INFO - Check for updates complete (32251 ms) 2016-09-16 15:42:34,026 org.owasp.dependencycheck.App:69 DEBUG - Exit code: 0 2016-09-16 15:42:58,012 org.owasp.dependencycheck.utils.Settings:486 DEBUG - Properties updated via merge:

data.driver_path='/usr/share/java/mysql-connector-java.jar' cve.url-2.0.modified='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz' cve.check.validforhours='0' cve.startyear='2002' data.version='3.0' analyzer.cocoapods.enabled='true' cve.url-1.2.base='https://nvd.nist.gov/download/nvdcve-%d.xml.gz' cve.url-2.0.base='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-%d.xml.gz' application.version='1.4.3' data.connection_string='jdbc:mysql://localhost:3306/dependencycheck' analyzer.archive.enabled='true' analyzer.ruby.gemspec.enabled='true' analyzer.assembly.enabled='true' analyzer.jar.enabled='true' analyzer.python.distribution.enabled='true' analyzer.cmake.enabled='true' analyzer.node.package.enabled='true' data.password='*****' cpe.url='http://static.nvd.nist.gov/feeds/xml/cpe/dictionary/official-cpe-dictionary_v2.3.xml.gz' downloader.quick.query.timestamp='true' application.name='Dependency-Check Core' engine.version.url='http://jeremylong.github.io/DependencyCheck/current.txt' analyzer.central.url='http://search.maven.org/solrsearch/select' data.user='dcuser' data.driver_name='com.mysql.jdbc.Driver' analyzer.swift.package.manager.enabled='true' cve.cpe.startswith.filter='cpe:/a:' max.download.threads='3' data.file_name='dc.h2.db' analyzer.experimental.enabled='false' analyzer.nexus.proxy='true' archive.scan.depth='3' analyzer.openssl.enabled='true' analyzer.composer.lock.enabled='true' analyzer.central.enabled='true' data.directory='[JAR]/data' cve.url.modified.validfordays='7' analyzer.nuspec.enabled='true' analyzer.nexus.enabled='false' cve.url-1.2.modified='https://nvd.nist.gov/download/nvdcve-Modified.xml.gz' analyzer.autoconf.enabled='true' cpe.validfordays='30' analyzer.nexus.url='https://repository.sonatype.org/service/local/' autoupdate='true' analyzer.python.package.enabled='true'

2016-09-16 15:42:58,017 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: data.directory='/opt/owasp/dependency-check/data' 2016-09-16 15:42:58,019 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: autoupdate='true' 2016-09-16 15:42:58,019 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.experimental.enabled='false' 2016-09-16 15:42:58,020 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.jar.enabled='true' 2016-09-16 15:42:58,020 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.archive.enabled='true' 2016-09-16 15:42:58,020 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.distribution.enabled='true' 2016-09-16 15:42:58,020 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.package.enabled='true' 2016-09-16 15:42:58,020 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.autoconf.enabled='true' 2016-09-16 15:42:58,021 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.cmake.enabled='true' 2016-09-16 15:42:58,021 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nuspec.enabled='true' 2016-09-16 15:42:58,021 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.assembly.enabled='true' 2016-09-16 15:42:58,021 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.bundle.audit.enabled='true' 2016-09-16 15:42:58,022 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.openssl.enabled='true' 2016-09-16 15:42:58,022 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.composer.lock.enabled='true' 2016-09-16 15:42:58,022 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.node.package.enabled='true' 2016-09-16 15:42:58,022 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.ruby.gemspec.enabled='true' 2016-09-16 15:42:58,023 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.central.enabled='true' 2016-09-16 15:42:58,023 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.enabled='true' 2016-09-16 15:42:58,023 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.proxy='true' 2016-09-16 15:42:58,029 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:108 DEBUG - Loading driver: com.mysql.jdbc.Driver 2016-09-16 15:42:58,030 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:112 DEBUG - Loading driver from: /usr/share/java/mysql-connector-java.jar 2016-09-16 15:42:58,042 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:144 DEBUG - Loading database connection 2016-09-16 15:42:58,042 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:145 DEBUG - Connection String: jdbc:mysql://localhost:3306/dependencycheck 2016-09-16 15:42:58,042 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:146 DEBUG - Database User: dcuser 2016-09-16 15:42:58,475 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Archive Analyzer 2016-09-16 15:42:58,476 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer File Name Analyzer 2016-09-16 15:42:58,480 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Jar Analyzer 2016-09-16 15:42:58,482 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Hint Analyzer 2016-09-16 15:42:58,486 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer CPE Analyzer 2016-09-16 15:42:58,489 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer False Positive Analyzer 2016-09-16 15:42:58,491 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Cpe Suppression Analyzer 2016-09-16 15:42:58,492 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Dependency Bundling Analyzer 2016-09-16 15:42:58,493 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer NVD CVE Analyzer 2016-09-16 15:42:58,494 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Vulnerability Suppression Analyzer 2016-09-16 15:42:58,496 org.owasp.dependencycheck.analyzer.CentralAnalyzer:112 DEBUG - Enabling the Central analyzer 2016-09-16 15:42:58,496 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Central Analyzer 2016-09-16 15:42:58,497 org.owasp.dependencycheck.analyzer.NexusAnalyzer:118 DEBUG - Nexus analyzer disabled, using Central instead 2016-09-16 15:42:58,497 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nexus Analyzer 2016-09-16 15:42:58,499 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nuspec Analyzer 2016-09-16 15:42:58,501 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Assembly Analyzer 2016-09-16 15:42:58,523 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer OpenSSL Source Analyzer 2016-09-16 15:42:58,534 org.owasp.dependencycheck.Engine:486 INFO - Checking for updates 2016-09-16 15:42:58,562 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:42:58,589 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:42:58,651 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-16 15:42:59,865 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2002.xml.gz 2016-09-16 15:43:00,490 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2003.xml.gz 2016-09-16 15:43:01,514 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2004.xml.gz 2016-09-16 15:43:02,230 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2005.xml.gz 2016-09-16 15:43:02,944 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2006.xml.gz 2016-09-16 15:43:03,645 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2007.xml.gz 2016-09-16 15:43:04,311 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2008.xml.gz 2016-09-16 15:43:04,955 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2009.xml.gz 2016-09-16 15:43:05,599 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2010.xml.gz 2016-09-16 15:43:06,595 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2011.xml.gz 2016-09-16 15:43:07,308 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2012.xml.gz 2016-09-16 15:43:08,024 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2013.xml.gz 2016-09-16 15:43:08,720 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2014.xml.gz 2016-09-16 15:43:09,406 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2015.xml.gz 2016-09-16 15:43:10,012 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-2016.xml.gz 2016-09-16 15:43:10,604 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:43:10,605 org.owasp.dependencycheck.data.update.EngineVersionCheck:104 DEBUG - Begin Engine Version Check 2016-09-16 15:43:10,606 org.owasp.dependencycheck.data.update.EngineVersionCheck:110 DEBUG - Last checked: 1471600816480 2016-09-16 15:43:10,606 org.owasp.dependencycheck.data.update.EngineVersionCheck:111 DEBUG - Now: 1474054990606 2016-09-16 15:43:10,606 org.owasp.dependencycheck.data.update.EngineVersionCheck:112 DEBUG - Current version: 1.4.3 2016-09-16 15:43:10,607 org.owasp.dependencycheck.data.update.EngineVersionCheck:171 DEBUG - Upgrade not needed 2016-09-16 15:43:10,608 org.owasp.dependencycheck.Engine:494 INFO - Check for updates complete (12073 ms) 2016-09-16 15:43:10,609 org.owasp.dependencycheck.App:69 DEBUG - Exit code: 0

2016-09-16 15:36:58,639 org.owasp.dependencycheck.utils.Settings:486 DEBUG - Properties updated via merge:

data.driver_path='/usr/share/java/mysql-connector-java.jar' cve.url-2.0.modified='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz' cve.check.validforhours='0' cve.startyear='2002' data.version='3.0' analyzer.cocoapods.enabled='true' cve.url-1.2.base='https://nvd.nist.gov/download/nvdcve-%d.xml.gz' cve.url-2.0.base='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-%d.xml.gz' application.version='1.4.3' data.connection_string='jdbc:mysql://localhost:3306/dependencycheck' analyzer.archive.enabled='true' analyzer.ruby.gemspec.enabled='true' analyzer.assembly.enabled='true' analyzer.jar.enabled='true' analyzer.python.distribution.enabled='true' analyzer.cmake.enabled='true' analyzer.node.package.enabled='true' data.password='*****' cpe.url='http://static.nvd.nist.gov/feeds/xml/cpe/dictionary/official-cpe-dictionary_v2.3.xml.gz' downloader.quick.query.timestamp='true' application.name='Dependency-Check Core' engine.version.url='http://jeremylong.github.io/DependencyCheck/current.txt' analyzer.central.url='http://search.maven.org/solrsearch/select' data.user='dcuser' data.driver_name='com.mysql.jdbc.Driver' analyzer.swift.package.manager.enabled='true' cve.cpe.startswith.filter='cpe:/a:' max.download.threads='3' data.file_name='dc.h2.db' analyzer.experimental.enabled='false' analyzer.nexus.proxy='true' archive.scan.depth='3' analyzer.openssl.enabled='true' analyzer.composer.lock.enabled='true' analyzer.central.enabled='true' data.directory='[JAR]/data' cve.url.modified.validfordays='7' analyzer.nuspec.enabled='true' analyzer.nexus.enabled='false' cve.url-1.2.modified='https://nvd.nist.gov/download/nvdcve-Modified.xml.gz' analyzer.autoconf.enabled='true' cpe.validfordays='30' analyzer.nexus.url='https://repository.sonatype.org/service/local/' autoupdate='true' analyzer.python.package.enabled='true'

2016-09-16 15:36:58,651 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: data.directory='/opt/owasp/dependency-check/data' 2016-09-16 15:36:58,653 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: autoupdate='true' 2016-09-16 15:36:58,653 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.experimental.enabled='false' 2016-09-16 15:36:58,653 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.jar.enabled='true' 2016-09-16 15:36:58,654 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.archive.enabled='true' 2016-09-16 15:36:58,654 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.distribution.enabled='true' 2016-09-16 15:36:58,654 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.package.enabled='true' 2016-09-16 15:36:58,654 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.autoconf.enabled='true' 2016-09-16 15:36:58,654 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.cmake.enabled='true' 2016-09-16 15:36:58,655 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nuspec.enabled='true' 2016-09-16 15:36:58,655 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.assembly.enabled='true' 2016-09-16 15:36:58,655 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.bundle.audit.enabled='true' 2016-09-16 15:36:58,655 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.openssl.enabled='true' 2016-09-16 15:36:58,656 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.composer.lock.enabled='true' 2016-09-16 15:36:58,656 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.node.package.enabled='true' 2016-09-16 15:36:58,656 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.ruby.gemspec.enabled='true' 2016-09-16 15:36:58,656 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.central.enabled='true' 2016-09-16 15:36:58,656 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.enabled='true' 2016-09-16 15:36:58,657 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.proxy='true' 2016-09-16 15:36:58,662 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:108 DEBUG - Loading driver: com.mysql.jdbc.Driver 2016-09-16 15:36:58,663 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:112 DEBUG - Loading driver from: /usr/share/java/mysql-connector-java.jar 2016-09-16 15:36:58,674 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:144 DEBUG - Loading database connection 2016-09-16 15:36:58,674 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:145 DEBUG - Connection String: jdbc:mysql://localhost:3306/dependencycheck 2016-09-16 15:36:58,674 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:146 DEBUG - Database User: dcuser 2016-09-16 15:36:59,107 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Archive Analyzer 2016-09-16 15:36:59,108 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer File Name Analyzer 2016-09-16 15:36:59,112 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Jar Analyzer 2016-09-16 15:36:59,114 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Hint Analyzer 2016-09-16 15:36:59,118 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer CPE Analyzer 2016-09-16 15:36:59,120 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer False Positive Analyzer 2016-09-16 15:36:59,122 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Cpe Suppression Analyzer 2016-09-16 15:36:59,124 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Dependency Bundling Analyzer 2016-09-16 15:36:59,125 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer NVD CVE Analyzer 2016-09-16 15:36:59,126 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Vulnerability Suppression Analyzer 2016-09-16 15:36:59,127 org.owasp.dependencycheck.analyzer.CentralAnalyzer:112 DEBUG - Enabling the Central analyzer 2016-09-16 15:36:59,128 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Central Analyzer 2016-09-16 15:36:59,129 org.owasp.dependencycheck.analyzer.NexusAnalyzer:118 DEBUG - Nexus analyzer disabled, using Central instead 2016-09-16 15:36:59,129 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nexus Analyzer 2016-09-16 15:36:59,131 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nuspec Analyzer 2016-09-16 15:36:59,133 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Assembly Analyzer 2016-09-16 15:36:59,156 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer OpenSSL Source Analyzer 2016-09-16 15:36:59,167 org.owasp.dependencycheck.Engine:486 INFO - Checking for updates 2016-09-16 15:36:59,196 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:36:59,210 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:36:59,271 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-16 15:37:00,074 org.owasp.dependencycheck.utils.Downloader:265 ERROR - IO Exception: Connection reset 2016-09-16 15:37:00,077 org.owasp.dependencycheck.utils.Downloader:266 DEBUG - Exception details java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:209) at java.net.SocketInputStream.read(SocketInputStream.java:141) at sun.security.ssl.InputRecord.readFully(InputRecord.java:465) at sun.security.ssl.InputRecord.read(InputRecord.java:503) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:153) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:254) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:221) at org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve.add(UpdateableNvdCve.java:101) at org.owasp.dependencycheck.data.update.NvdCveUpdater.retrieveCurrentTimestampsFromWeb(NvdCveUpdater.java:330) at org.owasp.dependencycheck.data.update.NvdCveUpdater.getUpdatesNeeded(NvdCveUpdater.java:259) at org.owasp.dependencycheck.data.update.NvdCveUpdater.update(NvdCveUpdater.java:79) at org.owasp.dependencycheck.Engine.doUpdates(Engine.java:492) at org.owasp.dependencycheck.App.runUpdateOnly(App.java:323) at org.owasp.dependencycheck.App.run(App.java:144) at org.owasp.dependencycheck.App.main(App.java:68) 2016-09-16 15:37:00,078 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: downloader.quick.query.timestamp='false' 2016-09-16 15:37:00,305 org.owasp.dependencycheck.utils.Downloader:265 ERROR - IO Exception: Connection reset 2016-09-16 15:37:00,305 org.owasp.dependencycheck.utils.Downloader:266 DEBUG - Exception details java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:209) at java.net.SocketInputStream.read(SocketInputStream.java:141) at sun.security.ssl.InputRecord.readFully(InputRecord.java:465) at sun.security.ssl.InputRecord.read(InputRecord.java:503) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:153) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:254) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:274) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:221) at org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve.add(UpdateableNvdCve.java:101) at org.owasp.dependencycheck.data.update.NvdCveUpdater.retrieveCurrentTimestampsFromWeb(NvdCveUpdater.java:330) at org.owasp.dependencycheck.data.update.NvdCveUpdater.getUpdatesNeeded(NvdCveUpdater.java:259) at org.owasp.dependencycheck.data.update.NvdCveUpdater.update(NvdCveUpdater.java:79) at org.owasp.dependencycheck.Engine.doUpdates(Engine.java:492) at org.owasp.dependencycheck.App.runUpdateOnly(App.java:323) at org.owasp.dependencycheck.App.run(App.java:144) at org.owasp.dependencycheck.App.main(App.java:68) 2016-09-16 15:37:00,307 org.owasp.dependencycheck.data.update.NvdCveUpdater:88 WARN - Unable to download the NVD CVE data; the results may not include the most recent CPE/CVEs from the NVD. 2016-09-16 15:37:00,308 org.owasp.dependencycheck.data.update.NvdCveUpdater:91 INFO - If you are behind a proxy you may need to configure dependency-check to use the proxy. 2016-09-16 15:37:00,309 org.owasp.dependencycheck.App:146 ERROR - Unable to download the NVD CVE data. 2016-09-16 15:37:00,309 org.owasp.dependencycheck.App:69 DEBUG - Exit code: -8 2016-09-16 15:43:40,633 org.owasp.dependencycheck.utils.Settings:486 DEBUG - Properties updated via merge:

data.driver_path='/usr/share/java/mysql-connector-java.jar' cve.url-2.0.modified='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz' cve.check.validforhours='0' cve.startyear='2002' data.version='3.0' analyzer.cocoapods.enabled='true' cve.url-1.2.base='https://nvd.nist.gov/download/nvdcve-%d.xml.gz' cve.url-2.0.base='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-%d.xml.gz' application.version='1.4.3' data.connection_string='jdbc:mysql://localhost:3306/dependencycheck' analyzer.archive.enabled='true' analyzer.ruby.gemspec.enabled='true' analyzer.assembly.enabled='true' analyzer.jar.enabled='true' analyzer.python.distribution.enabled='true' analyzer.cmake.enabled='true' analyzer.node.package.enabled='true' data.password='*****' cpe.url='http://static.nvd.nist.gov/feeds/xml/cpe/dictionary/official-cpe-dictionary_v2.3.xml.gz' downloader.quick.query.timestamp='true' application.name='Dependency-Check Core' engine.version.url='http://jeremylong.github.io/DependencyCheck/current.txt' analyzer.central.url='http://search.maven.org/solrsearch/select' data.user='dcuser' data.driver_name='com.mysql.jdbc.Driver' analyzer.swift.package.manager.enabled='true' cve.cpe.startswith.filter='cpe:/a:' max.download.threads='3' data.file_name='dc.h2.db' analyzer.experimental.enabled='false' analyzer.nexus.proxy='true' archive.scan.depth='3' analyzer.openssl.enabled='true' analyzer.composer.lock.enabled='true' analyzer.central.enabled='true' data.directory='[JAR]/data' cve.url.modified.validfordays='7' analyzer.nuspec.enabled='true' analyzer.nexus.enabled='false' cve.url-1.2.modified='https://nvd.nist.gov/download/nvdcve-Modified.xml.gz' analyzer.autoconf.enabled='true' cpe.validfordays='30' analyzer.nexus.url='https://repository.sonatype.org/service/local/' autoupdate='true' analyzer.python.package.enabled='true'

2016-09-16 15:43:40,638 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: data.directory='/opt/owasp/dependency-check/data' 2016-09-16 15:43:40,639 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: autoupdate='true' 2016-09-16 15:43:40,640 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.experimental.enabled='false' 2016-09-16 15:43:40,640 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.jar.enabled='true' 2016-09-16 15:43:40,640 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.archive.enabled='true' 2016-09-16 15:43:40,640 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.distribution.enabled='true' 2016-09-16 15:43:40,641 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.package.enabled='true' 2016-09-16 15:43:40,641 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.autoconf.enabled='true' 2016-09-16 15:43:40,642 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.cmake.enabled='true' 2016-09-16 15:43:40,642 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nuspec.enabled='true' 2016-09-16 15:43:40,642 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.assembly.enabled='true' 2016-09-16 15:43:40,642 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.bundle.audit.enabled='true' 2016-09-16 15:43:40,643 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.openssl.enabled='true' 2016-09-16 15:43:40,643 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.composer.lock.enabled='true' 2016-09-16 15:43:40,643 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.node.package.enabled='true' 2016-09-16 15:43:40,643 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.ruby.gemspec.enabled='true' 2016-09-16 15:43:40,643 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.central.enabled='true' 2016-09-16 15:43:40,644 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.enabled='true' 2016-09-16 15:43:40,644 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.proxy='true' 2016-09-16 15:43:40,650 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:108 DEBUG - Loading driver: com.mysql.jdbc.Driver 2016-09-16 15:43:40,650 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:112 DEBUG - Loading driver from: /usr/share/java/mysql-connector-java.jar 2016-09-16 15:43:40,662 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:144 DEBUG - Loading database connection 2016-09-16 15:43:40,662 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:145 DEBUG - Connection String: jdbc:mysql://localhost:3306/dependencycheck 2016-09-16 15:43:40,662 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:146 DEBUG - Database User: dcuser 2016-09-16 15:43:41,050 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Archive Analyzer 2016-09-16 15:43:41,051 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer File Name Analyzer 2016-09-16 15:43:41,053 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Jar Analyzer 2016-09-16 15:43:41,054 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Hint Analyzer 2016-09-16 15:43:41,056 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer CPE Analyzer 2016-09-16 15:43:41,058 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer False Positive Analyzer 2016-09-16 15:43:41,059 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Cpe Suppression Analyzer 2016-09-16 15:43:41,060 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Dependency Bundling Analyzer 2016-09-16 15:43:41,060 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer NVD CVE Analyzer 2016-09-16 15:43:41,061 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Vulnerability Suppression Analyzer 2016-09-16 15:43:41,061 org.owasp.dependencycheck.analyzer.CentralAnalyzer:112 DEBUG - Enabling the Central analyzer 2016-09-16 15:43:41,062 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Central Analyzer 2016-09-16 15:43:41,062 org.owasp.dependencycheck.analyzer.NexusAnalyzer:118 DEBUG - Nexus analyzer disabled, using Central instead 2016-09-16 15:43:41,062 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nexus Analyzer 2016-09-16 15:43:41,063 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nuspec Analyzer 2016-09-16 15:43:41,064 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Assembly Analyzer 2016-09-16 15:43:41,077 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer OpenSSL Source Analyzer 2016-09-16 15:43:41,083 org.owasp.dependencycheck.Engine:486 INFO - Checking for updates 2016-09-16 15:43:41,102 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:43:41,112 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-16 15:43:41,144 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-16 15:43:41,569 org.owasp.dependencycheck.utils.Downloader:265 ERROR - IO Exception: Connection reset 2016-09-16 15:43:41,573 org.owasp.dependencycheck.utils.Downloader:266 DEBUG - Exception details java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:209) at java.net.SocketInputStream.read(SocketInputStream.java:141) at sun.security.ssl.InputRecord.readFully(InputRecord.java:465) at sun.security.ssl.InputRecord.read(InputRecord.java:503) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:153) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:254) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:221) at org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve.add(UpdateableNvdCve.java:101) at org.owasp.dependencycheck.data.update.NvdCveUpdater.retrieveCurrentTimestampsFromWeb(NvdCveUpdater.java:330) at org.owasp.dependencycheck.data.update.NvdCveUpdater.getUpdatesNeeded(NvdCveUpdater.java:259) at org.owasp.dependencycheck.data.update.NvdCveUpdater.update(NvdCveUpdater.java:79) at org.owasp.dependencycheck.Engine.doUpdates(Engine.java:492) at org.owasp.dependencycheck.App.runUpdateOnly(App.java:323) at org.owasp.dependencycheck.App.run(App.java:144) at org.owasp.dependencycheck.App.main(App.java:68) 2016-09-16 15:43:41,574 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: downloader.quick.query.timestamp='false' 2016-09-16 15:43:41,820 org.owasp.dependencycheck.utils.Downloader:265 ERROR - IO Exception: Connection reset 2016-09-16 15:43:41,820 org.owasp.dependencycheck.utils.Downloader:266 DEBUG - Exception details java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:209) at java.net.SocketInputStream.read(SocketInputStream.java:141) at sun.security.ssl.InputRecord.readFully(InputRecord.java:465) at sun.security.ssl.InputRecord.read(InputRecord.java:503) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:153) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:254) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:274) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:221) at org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve.add(UpdateableNvdCve.java:101) at org.owasp.dependencycheck.data.update.NvdCveUpdater.retrieveCurrentTimestampsFromWeb(NvdCveUpdater.java:330) at org.owasp.dependencycheck.data.update.NvdCveUpdater.getUpdatesNeeded(NvdCveUpdater.java:259) at org.owasp.dependencycheck.data.update.NvdCveUpdater.update(NvdCveUpdater.java:79) at org.owasp.dependencycheck.Engine.doUpdates(Engine.java:492) at org.owasp.dependencycheck.App.runUpdateOnly(App.java:323) at org.owasp.dependencycheck.App.run(App.java:144) at org.owasp.dependencycheck.App.main(App.java:68) 2016-09-16 15:43:41,821 org.owasp.dependencycheck.data.update.NvdCveUpdater:88 WARN - Unable to download the NVD CVE data; the results may not include the most recent CPE/CVEs from the NVD. 2016-09-16 15:43:41,821 org.owasp.dependencycheck.data.update.NvdCveUpdater:91 INFO - If you are behind a proxy you may need to configure dependency-check to use the proxy. 2016-09-16 15:43:41,822 org.owasp.dependencycheck.App:146 ERROR - Unable to download the NVD CVE data. 2016-09-16 15:43:41,823 org.owasp.dependencycheck.App:69 DEBUG - Exit code: -8

jeremylong commented 7 years ago

@Phone911 can you re-run the failing script using the following (minor typo in the export above, and I'll need a slightly different log):

export JAVA_OPTS=-Djavax.net.debug=all
dependency-check.sh --updateonly > debug.txt 2>&1

And then post the debug.txt file here. This only needs to be done for the failing instance. The debug.txt should contain a TON of data on algorithms, cert stores, the TLS handshake, etc.

--Jeremy

Phone911 commented 7 years ago

I apologize for the error in setting JAVA_OPTS. Attached is the console and the --log output.

Gary Burchett

Tel: +1 (919) 531-6995 Mobile: +1 (919) 413-3146

From: Jeremy Long [mailto:notifications@github.com] Sent: Saturday, September 17, 2016 9:48 AM To: jeremylong/DependencyCheck DependencyCheck@noreply.github.com Cc: Gary Burchett Gary.Burchett@sas.com; Mention mention@noreply.github.com Subject: Re: [jeremylong/DependencyCheck] dependencycheck update fails using openJDK (#561)

@Phone911https://github.com/Phone911 can you re-run the failing script using the following (minor typo in the export above, and I'll need a slightly different log):

export JAVA_OPTS=-Djavax.net.debug=all

dependency-check.sh --updateonly > debug.txt 2>&1

And then post the debug.txt file here. This only needs to be done for the failing instance. The debug.txt should contain a TON of data on algorithms, cert stores, the TLS handshake, etc.

--Jeremy

— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHubhttps://github.com/jeremylong/DependencyCheck/issues/561#issuecomment-247771679, or mute the threadhttps://github.com/notifications/unsubscribe-auth/AGdX2oek3m5rspiVpAvyHAB7FC4Us644ks5qq--igaJpZM4J92lL.

2016-09-17 15:32:49,003 org.owasp.dependencycheck.utils.Settings:486 DEBUG - Properties updated via merge:

data.driver_path='/usr/share/java/mysql-connector-java.jar' cve.url-2.0.modified='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz' cve.check.validforhours='0' cve.startyear='2002' data.version='3.0' analyzer.cocoapods.enabled='true' cve.url-1.2.base='https://nvd.nist.gov/download/nvdcve-%d.xml.gz' cve.url-2.0.base='https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-%d.xml.gz' application.version='1.4.3' data.connection_string='jdbc:mysql://localhost:3306/dependencycheck' analyzer.archive.enabled='true' analyzer.ruby.gemspec.enabled='true' analyzer.assembly.enabled='true' analyzer.jar.enabled='true' analyzer.python.distribution.enabled='true' analyzer.cmake.enabled='true' analyzer.node.package.enabled='true' data.password='*****' cpe.url='http://static.nvd.nist.gov/feeds/xml/cpe/dictionary/official-cpe-dictionary_v2.3.xml.gz' downloader.quick.query.timestamp='true' application.name='Dependency-Check Core' engine.version.url='http://jeremylong.github.io/DependencyCheck/current.txt' analyzer.central.url='http://search.maven.org/solrsearch/select' data.user='dcuser' data.driver_name='com.mysql.jdbc.Driver' analyzer.swift.package.manager.enabled='true' cve.cpe.startswith.filter='cpe:/a:' max.download.threads='3' data.file_name='dc.h2.db' analyzer.experimental.enabled='false' analyzer.nexus.proxy='true' archive.scan.depth='3' analyzer.openssl.enabled='true' analyzer.composer.lock.enabled='true' analyzer.central.enabled='true' data.directory='[JAR]/data' cve.url.modified.validfordays='7' analyzer.nuspec.enabled='true' analyzer.nexus.enabled='false' cve.url-1.2.modified='https://nvd.nist.gov/download/nvdcve-Modified.xml.gz' analyzer.autoconf.enabled='true' cpe.validfordays='30' analyzer.nexus.url='https://repository.sonatype.org/service/local/' autoupdate='true' analyzer.python.package.enabled='true'

2016-09-17 15:32:49,008 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: data.directory='/opt/owasp/dependency-check/data' 2016-09-17 15:32:49,010 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: autoupdate='true' 2016-09-17 15:32:49,010 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.experimental.enabled='false' 2016-09-17 15:32:49,010 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.jar.enabled='true' 2016-09-17 15:32:49,010 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.archive.enabled='true' 2016-09-17 15:32:49,011 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.distribution.enabled='true' 2016-09-17 15:32:49,011 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.python.package.enabled='true' 2016-09-17 15:32:49,011 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.autoconf.enabled='true' 2016-09-17 15:32:49,011 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.cmake.enabled='true' 2016-09-17 15:32:49,012 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nuspec.enabled='true' 2016-09-17 15:32:49,012 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.assembly.enabled='true' 2016-09-17 15:32:49,012 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.bundle.audit.enabled='true' 2016-09-17 15:32:49,012 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.openssl.enabled='true' 2016-09-17 15:32:49,012 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.composer.lock.enabled='true' 2016-09-17 15:32:49,013 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.node.package.enabled='true' 2016-09-17 15:32:49,013 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.ruby.gemspec.enabled='true' 2016-09-17 15:32:49,013 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.central.enabled='true' 2016-09-17 15:32:49,013 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.enabled='true' 2016-09-17 15:32:49,013 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: analyzer.nexus.proxy='true' 2016-09-17 15:32:49,019 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:108 DEBUG - Loading driver: com.mysql.jdbc.Driver 2016-09-17 15:32:49,019 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:112 DEBUG - Loading driver from: /usr/share/java/mysql-connector-java.jar 2016-09-17 15:32:49,030 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:144 DEBUG - Loading database connection 2016-09-17 15:32:49,031 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:145 DEBUG - Connection String: jdbc:mysql://localhost:3306/dependencycheck 2016-09-17 15:32:49,031 org.owasp.dependencycheck.data.nvdcve.ConnectionFactory:146 DEBUG - Database User: dcuser 2016-09-17 15:32:49,453 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Archive Analyzer 2016-09-17 15:32:49,454 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer File Name Analyzer 2016-09-17 15:32:49,456 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Jar Analyzer 2016-09-17 15:32:49,457 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Hint Analyzer 2016-09-17 15:32:49,459 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer CPE Analyzer 2016-09-17 15:32:49,461 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer False Positive Analyzer 2016-09-17 15:32:49,462 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Cpe Suppression Analyzer 2016-09-17 15:32:49,463 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Dependency Bundling Analyzer 2016-09-17 15:32:49,464 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer NVD CVE Analyzer 2016-09-17 15:32:49,464 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Vulnerability Suppression Analyzer 2016-09-17 15:32:49,465 org.owasp.dependencycheck.analyzer.CentralAnalyzer:112 DEBUG - Enabling the Central analyzer 2016-09-17 15:32:49,465 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Central Analyzer 2016-09-17 15:32:49,465 org.owasp.dependencycheck.analyzer.NexusAnalyzer:118 DEBUG - Nexus analyzer disabled, using Central instead 2016-09-17 15:32:49,466 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nexus Analyzer 2016-09-17 15:32:49,466 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Nuspec Analyzer 2016-09-17 15:32:49,468 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer Assembly Analyzer 2016-09-17 15:32:49,480 org.owasp.dependencycheck.analyzer.AnalyzerService:73 DEBUG - Loaded Analyzer OpenSSL Source Analyzer 2016-09-17 15:32:49,486 org.owasp.dependencycheck.Engine:486 INFO - Checking for updates 2016-09-17 15:32:49,500 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-17 15:32:49,508 org.owasp.dependencycheck.data.nvdcve.CveDB:90 DEBUG - Database dialect: MySQL 2016-09-17 15:32:49,553 org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve:100 DEBUG - Checking for updates from: https://nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz 2016-09-17 15:32:49,855 org.owasp.dependencycheck.utils.Downloader:265 ERROR - IO Exception: Connection reset 2016-09-17 15:32:49,857 org.owasp.dependencycheck.utils.Downloader:266 DEBUG - Exception details java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:209) at java.net.SocketInputStream.read(SocketInputStream.java:141) at sun.security.ssl.InputRecord.readFully(InputRecord.java:465) at sun.security.ssl.InputRecord.read(InputRecord.java:503) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:153) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:254) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:221) at org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve.add(UpdateableNvdCve.java:101) at org.owasp.dependencycheck.data.update.NvdCveUpdater.retrieveCurrentTimestampsFromWeb(NvdCveUpdater.java:330) at org.owasp.dependencycheck.data.update.NvdCveUpdater.getUpdatesNeeded(NvdCveUpdater.java:259) at org.owasp.dependencycheck.data.update.NvdCveUpdater.update(NvdCveUpdater.java:79) at org.owasp.dependencycheck.Engine.doUpdates(Engine.java:492) at org.owasp.dependencycheck.App.runUpdateOnly(App.java:323) at org.owasp.dependencycheck.App.run(App.java:144) at org.owasp.dependencycheck.App.main(App.java:68) 2016-09-17 15:32:49,857 org.owasp.dependencycheck.utils.Settings:504 DEBUG - Setting: downloader.quick.query.timestamp='false' 2016-09-17 15:32:49,905 org.owasp.dependencycheck.utils.Downloader:265 ERROR - IO Exception: Connection reset 2016-09-17 15:32:49,905 org.owasp.dependencycheck.utils.Downloader:266 DEBUG - Exception details java.net.SocketException: Connection reset at java.net.SocketInputStream.read(SocketInputStream.java:209) at java.net.SocketInputStream.read(SocketInputStream.java:141) at sun.security.ssl.InputRecord.readFully(InputRecord.java:465) at sun.security.ssl.InputRecord.read(InputRecord.java:503) at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:973) at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1375) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1403) at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1387) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:559) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:185) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:153) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:254) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:274) at org.owasp.dependencycheck.utils.Downloader.getLastModified(Downloader.java:221) at org.owasp.dependencycheck.data.update.nvd.UpdateableNvdCve.add(UpdateableNvdCve.java:101) at org.owasp.dependencycheck.data.update.NvdCveUpdater.retrieveCurrentTimestampsFromWeb(NvdCveUpdater.java:330) at org.owasp.dependencycheck.data.update.NvdCveUpdater.getUpdatesNeeded(NvdCveUpdater.java:259) at org.owasp.dependencycheck.data.update.NvdCveUpdater.update(NvdCveUpdater.java:79) at org.owasp.dependencycheck.Engine.doUpdates(Engine.java:492) at org.owasp.dependencycheck.App.runUpdateOnly(App.java:323) at org.owasp.dependencycheck.App.run(App.java:144) at org.owasp.dependencycheck.App.main(App.java:68) 2016-09-17 15:32:49,906 org.owasp.dependencycheck.data.update.NvdCveUpdater:88 WARN - Unable to download the NVD CVE data; the results may not include the most recent CPE/CVEs from the NVD. 2016-09-17 15:32:49,906 org.owasp.dependencycheck.data.update.NvdCveUpdater:91 INFO - If you are behind a proxy you may need to configure dependency-check to use the proxy. 2016-09-17 15:32:49,906 org.owasp.dependencycheck.App:146 ERROR - Unable to download the NVD CVE data. 2016-09-17 15:32:49,906 org.owasp.dependencycheck.App:69 DEBUG - Exit code: -8

[INFO] Checking for updates keyStore is : keyStore type is : jks keyStore provider is : init keystore init keymanager of type SunX509 trustStore is: /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.x86_64/jre/lib/security/cacerts trustStore type is : jks trustStore provider is : init truststore adding as trusted cert: Subject: CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK Issuer: CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK Algorithm: RSA; Serial number: 0x3e8 Valid from Thu May 15 01:13:14 EDT 2003 until Mon May 15 00:52:29 EDT 2023

adding as trusted cert: Subject: CN=SecureTrust CA, O=SecureTrust Corporation, C=US Issuer: CN=SecureTrust CA, O=SecureTrust Corporation, C=US Algorithm: RSA; Serial number: 0xcf08e5c0816a5ad427ff0eb271859d0 Valid from Tue Nov 07 14:31:18 EST 2006 until Mon Dec 31 14:40:55 EST 2029

adding as trusted cert: Subject: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Issuer: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Algorithm: EC; Serial number: 0xa68b79290000000050d091f9 Valid from Tue Dec 18 10:25:36 EST 2012 until Fri Dec 18 10:55:36 EST 2037

adding as trusted cert: Subject: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0x83be056904246b1a1756ac95991c74a Valid from Thu Nov 09 19:00:00 EST 2006 until Sun Nov 09 19:00:00 EST 2031

adding as trusted cert: Subject: CN=Microsec e-Szigno Root CA, OU=e-Szigno CA, O=Microsec Ltd., L=Budapest, C=HU Issuer: CN=Microsec e-Szigno Root CA, OU=e-Szigno CA, O=Microsec Ltd., L=Budapest, C=HU Algorithm: RSA; Serial number: 0xccb8e7bf4e291afda2dc66a51c2c0f11 Valid from Wed Apr 06 08:28:44 EDT 2005 until Thu Apr 06 08:28:44 EDT 2017

adding as trusted cert: Subject: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP Issuer: OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 30 00:20:49 EDT 2003 until Sat Sep 30 00:20:49 EDT 2023

adding as trusted cert: Subject: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x445734245b81899b35f2ceb82b3b5ba726f07528 Valid from Thu Jan 12 13:59:32 EST 2012 until Sun Jan 12 13:59:32 EST 2042

adding as trusted cert: Subject: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0x59b1b579e8e2132e23907bda777755c Valid from Thu Aug 01 08:00:00 EDT 2013 until Fri Jan 15 07:00:00 EST 2038

adding as trusted cert: Subject: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US Issuer: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US Algorithm: RSA; Serial number: 0x4 Valid from Mon Jun 21 00:00:00 EDT 1999 until Sun Jun 21 00:00:00 EDT 2020

adding as trusted cert: Subject: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 2 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network Issuer: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 2 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network Algorithm: RSA; Serial number: 0x1 Valid from Fri Jun 25 20:19:54 EDT 1999 until Tue Jun 25 20:19:54 EDT 2019

adding as trusted cert: Subject: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Primary Certification Authority, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x18acb56afd69b6153a636cafdafac4a1 Valid from Sun Nov 26 19:00:00 EST 2006 until Wed Jul 16 19:59:59 EDT 2036

adding as trusted cert: Subject: O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Aralık 2007, L=Ankara, C=TR, CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı Issuer: O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Aralık 2007, L=Ankara, C=TR, CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı Algorithm: RSA; Serial number: 0x1 Valid from Tue Dec 25 13:37:19 EST 2007 until Fri Dec 22 13:37:19 EST 2017

adding as trusted cert: Subject: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP Issuer: OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP Algorithm: RSA; Serial number: 0x0 Valid from Fri May 29 01:00:39 EDT 2009 until Tue May 29 01:00:39 EDT 2029

adding as trusted cert: Subject: CN=Staat der Nederlanden Root CA, O=Staat der Nederlanden, C=NL Issuer: CN=Staat der Nederlanden Root CA, O=Staat der Nederlanden, C=NL Algorithm: RSA; Serial number: 0x98968a Valid from Tue Dec 17 04:23:49 EST 2002 until Wed Dec 16 04:15:38 EST 2015

adding as trusted cert: Subject: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Issuer: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For authorized use only", OU=Class 3 Public Primary Certification Authority - G2, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x7dd9fe07cfa81eb7107967fba78934c6 Valid from Sun May 17 20:00:00 EDT 1998 until Tue Aug 01 19:59:59 EDT 2028

adding as trusted cert: Subject: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW Issuer: OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW Algorithm: RSA; Serial number: 0x15c8bd65475cafb897005ee406d2bc9d Valid from Sun Dec 19 21:31:27 EST 2004 until Tue Dec 19 21:31:27 EST 2034

adding as trusted cert: Subject: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US Issuer: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US Algorithm: RSA; Serial number: 0x1 Valid from Mon Jun 21 00:00:00 EDT 1999 until Sun Jun 21 00:00:00 EDT 2020

adding as trusted cert: Subject: CN=AffirmTrust Commercial, O=AffirmTrust, C=US Issuer: CN=AffirmTrust Commercial, O=AffirmTrust, C=US Algorithm: RSA; Serial number: 0x7777062726a9b17c Valid from Fri Jan 29 09:06:06 EST 2010 until Tue Dec 31 09:06:06 EST 2030

adding as trusted cert: Subject: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL Issuer: CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL Algorithm: RSA; Serial number: 0x444c0 Valid from Wed Oct 22 08:07:37 EDT 2008 until Mon Dec 31 07:07:37 EST 2029

adding as trusted cert: Subject: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL Issuer: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL Algorithm: RSA; Serial number: 0x1 Valid from Sun Sep 17 15:46:36 EDT 2006 until Wed Sep 17 15:46:36 EDT 2036

adding as trusted cert: Subject: CN=Certinomis - Autorité Racine, OU=0002 433998903, O=Certinomis, C=FR Issuer: CN=Certinomis - Autorité Racine, OU=0002 433998903, O=Certinomis, C=FR Algorithm: RSA; Serial number: 0x1 Valid from Wed Sep 17 04:28:59 EDT 2008 until Sun Sep 17 04:28:59 EDT 2028

adding as trusted cert: Subject: CN=DST ACES CA X6, OU=DST ACES, O=Digital Signature Trust, C=US Issuer: CN=DST ACES CA X6, OU=DST ACES, O=Digital Signature Trust, C=US Algorithm: RSA; Serial number: 0xd5e990ad69db778ecd807563b8615d9 Valid from Thu Nov 20 16:19:58 EST 2003 until Mon Nov 20 16:19:58 EST 2017

adding as trusted cert: Subject: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US Issuer: CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US Algorithm: RSA; Serial number: 0x50946cec18ead59c4dd597ef758fa0ad Valid from Mon Nov 01 12:14:04 EST 2004 until Mon Jan 01 00:37:19 EST 2035

adding as trusted cert: Subject: CN=EC-ACC, OU=Jerarquia Entitats de Certificacio Catalanes, OU=Vegeu https://www.catcert.net/verarrel (c)03, OU=Serveis Publics de Certificacio, O=Agencia Catalana de Certificacio (NIF Q-0801176-I), C=ES Issuer: CN=EC-ACC, OU=Jerarquia Entitats de Certificacio Catalanes, OU=Vegeu https://www.catcert.net/verarrel (c)03, OU=Serveis Publics de Certificacio, O=Agencia Catalana de Certificacio (NIF Q-0801176-I), C=ES Algorithm: RSA; Serial number: 0x-11d4c2142bde21eb579d53fb0c223bff Valid from Tue Jan 07 18:00:00 EST 2003 until Tue Jan 07 17:59:59 EST 2031

adding as trusted cert: Subject: CN=CA Disig Root R1, O=Disig a.s., L=Bratislava, C=SK Issuer: CN=CA Disig Root R1, O=Disig a.s., L=Bratislava, C=SK Algorithm: RSA; Serial number: 0xc3039aee50906e28 Valid from Thu Jul 19 05:06:56 EDT 2012 until Sat Jul 19 05:06:56 EDT 2042

adding as trusted cert: Subject: CN=Sonera Class2 CA, O=Sonera, C=FI Issuer: CN=Sonera Class2 CA, O=Sonera, C=FI Algorithm: RSA; Serial number: 0x1d Valid from Fri Apr 06 03:29:40 EDT 2001 until Tue Apr 06 03:29:40 EDT 2021

adding as trusted cert: Subject: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Primary Certification Authority - G2, OU=(c) 2007 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Algorithm: EC; Serial number: 0x3cb2f4480a00e2feeb243b5e603ec36b Valid from Sun Nov 04 19:00:00 EST 2007 until Mon Jan 18 18:59:59 EST 2038

adding as trusted cert: Subject: OU=Equifax Secure Certificate Authority, O=Equifax, C=US Issuer: OU=Equifax Secure Certificate Authority, O=Equifax, C=US Algorithm: RSA; Serial number: 0x35def4cf Valid from Sat Aug 22 12:41:51 EDT 1998 until Wed Aug 22 12:41:51 EDT 2018

adding as trusted cert: Subject: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB Algorithm: EC; Serial number: 0x1f47afaa62007050544c019e9b63992a Valid from Wed Mar 05 19:00:00 EST 2008 until Mon Jan 18 18:59:59 EST 2038

adding as trusted cert: Subject: CN=CA 沃通根证书, O=WoSign CA Limited, C=CN Issuer: CN=CA 沃通根证书, O=WoSign CA Limited, C=CN Algorithm: RSA; Serial number: 0x50706bcdd813fc1b4e3b3372d211488d Valid from Fri Aug 07 21:00:01 EDT 2009 until Sun Aug 07 21:00:01 EDT 2039

adding as trusted cert: Subject: CN=Certinomis - Root CA, OU=0002 433998903, O=Certinomis, C=FR Issuer: CN=Certinomis - Root CA, OU=0002 433998903, O=Certinomis, C=FR Algorithm: RSA; Serial number: 0x1 Valid from Mon Oct 21 05:17:18 EDT 2013 until Fri Oct 21 05:17:18 EDT 2033

adding as trusted cert: Subject: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0x2ac5c266a0b409b8f0b79f2ae462577 Valid from Thu Nov 09 19:00:00 EST 2006 until Sun Nov 09 19:00:00 EST 2031

adding as trusted cert: Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3 Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3 Algorithm: RSA; Serial number: 0x4000000000121585308a2 Valid from Wed Mar 18 06:00:00 EDT 2009 until Sun Mar 18 06:00:00 EDT 2029

adding as trusted cert: Subject: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Universal CA, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x1 Valid from Thu Mar 04 00:00:00 EST 2004 until Sun Mar 04 00:00:00 EST 2029

adding as trusted cert: Subject: CN=Certification Authority of WoSign, O=WoSign CA Limited, C=CN Issuer: CN=Certification Authority of WoSign, O=WoSign CA Limited, C=CN Algorithm: RSA; Serial number: 0x5e68d61171946350560068f33ec9c591 Valid from Fri Aug 07 21:00:01 EDT 2009 until Sun Aug 07 21:00:01 EDT 2039

adding as trusted cert: Subject: CN=GeoTrust Universal CA 2, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Universal CA 2, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x1 Valid from Thu Mar 04 00:00:00 EST 2004 until Sun Mar 04 00:00:00 EST 2029

adding as trusted cert: Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE Algorithm: RSA; Serial number: 0x20000b9 Valid from Fri May 12 14:46:00 EDT 2000 until Mon May 12 19:59:00 EDT 2025

adding as trusted cert: Subject: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US Algorithm: RSA; Serial number: 0x0 Valid from Tue Jun 29 13:39:16 EDT 2004 until Thu Jun 29 13:39:16 EDT 2034

adding as trusted cert: Subject: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Algorithm: RSA; Serial number: 0x1 Valid from Wed Dec 31 19:00:00 EST 2003 until Sun Dec 31 18:59:59 EST 2028

adding as trusted cert: Subject: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Issuer: CN=UTN-USERFirst-Hardware, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, ST=UT, C=US Algorithm: RSA; Serial number: 0x44be0c8b500024b411d3362afe650afd Valid from Fri Jul 09 14:10:42 EDT 1999 until Tue Jul 09 14:19:22 EDT 2019

adding as trusted cert: Subject: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU Issuer: CN=Chambers of Commerce Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 30 12:13:43 EDT 2003 until Wed Sep 30 12:13:44 EDT 2037

adding as trusted cert: Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x9b7e0649a33e62b9d5ee90487129ef57 Valid from Thu Sep 30 20:00:00 EDT 1999 until Wed Jul 16 19:59:59 EDT 2036

adding as trusted cert: Subject: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE Issuer: CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE Algorithm: RSA; Serial number: 0x40000000001154b5ac394 Valid from Tue Sep 01 08:00:00 EDT 1998 until Fri Jan 28 07:00:00 EST 2028

adding as trusted cert: Subject: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR Issuer: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR Algorithm: RSA; Serial number: 0x8e17fe242081 Valid from Tue Apr 30 04:07:01 EDT 2013 until Fri Apr 28 04:07:01 EDT 2023

adding as trusted cert: Subject: CN=AffirmTrust Networking, O=AffirmTrust, C=US Issuer: CN=AffirmTrust Networking, O=AffirmTrust, C=US Algorithm: RSA; Serial number: 0x7c4f04391cd4992d Valid from Fri Jan 29 09:08:24 EST 2010 until Tue Dec 31 09:08:24 EST 2030

adding as trusted cert: Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW Algorithm: RSA; Serial number: 0xcbe Valid from Wed Jun 27 02:28:33 EDT 2012 until Tue Dec 31 10:59:59 EST 2030

adding as trusted cert: Subject: CN=AffirmTrust Premium, O=AffirmTrust, C=US Issuer: CN=AffirmTrust Premium, O=AffirmTrust, C=US Algorithm: RSA; Serial number: 0x6d8c1446b1a60aee Valid from Fri Jan 29 09:10:36 EST 2010 until Mon Dec 31 09:10:36 EST 2040

adding as trusted cert: Subject: CN=NetLock Expressz (Class C) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU Issuer: CN=NetLock Expressz (Class C) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU Algorithm: RSA; Serial number: 0x68 Valid from Thu Feb 25 09:08:11 EST 1999 until Wed Feb 20 09:08:11 EST 2019

adding as trusted cert: Subject: EMAILADDRESS=igca@sgdn.pm.gouv.fr, CN=IGC/A, OU=DCSSI, O=PM/SGDN, L=Paris, ST=France, C=FR Issuer: EMAILADDRESS=igca@sgdn.pm.gouv.fr, CN=IGC/A, OU=DCSSI, O=PM/SGDN, L=Paris, ST=France, C=FR Algorithm: RSA; Serial number: 0x3911451094 Valid from Fri Dec 13 09:29:23 EST 2002 until Sat Oct 17 10:29:22 EDT 2020

adding as trusted cert: Subject: O=Government Root Certification Authority, C=TW Issuer: O=Government Root Certification Authority, C=TW Algorithm: RSA; Serial number: 0x1f9d595ad72fc20644a5800869e35ef6 Valid from Thu Dec 05 08:23:33 EST 2002 until Sun Dec 05 08:23:33 EST 2032

adding as trusted cert: Subject: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Primary Certification Authority - G3, OU=(c) 2008 GeoTrust Inc. - For authorized use only, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x15ac6e9419b2794b41f627a9c3180f1f Valid from Tue Apr 01 20:00:00 EDT 2008 until Tue Dec 01 18:59:59 EST 2037

adding as trusted cert: Subject: CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW Issuer: CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW Algorithm: RSA; Serial number: 0x1 Valid from Thu Aug 28 03:24:33 EDT 2008 until Tue Dec 31 10:59:59 EST 2030

adding as trusted cert: Subject: C=DE, O=Atos, CN=Atos TrustedRoot 2011 Issuer: C=DE, O=Atos, CN=Atos TrustedRoot 2011 Algorithm: RSA; Serial number: 0x5c33cb622c5fb332 Valid from Thu Jul 07 10:58:30 EDT 2011 until Tue Dec 31 18:59:59 EST 2030

adding as trusted cert: Subject: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU Issuer: CN=Chambers of Commerce Root - 2008, O=AC Camerfirma S.A., SERIALNUMBER=A82743287, L=Madrid (see current address at www.camerfirma.com/address), C=EU Algorithm: RSA; Serial number: 0xa3da427ea4b1aeda Valid from Fri Aug 01 08:29:50 EDT 2008 until Sat Jul 31 08:29:50 EDT 2038

adding as trusted cert: Subject: CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP Issuer: CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP Algorithm: RSA; Serial number: 0x1 Valid from Wed Apr 08 00:56:47 EDT 2009 until Sun Apr 08 00:56:47 EDT 2029

adding as trusted cert: Subject: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH Issuer: CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH Algorithm: RSA; Serial number: 0x4f1bd42f54bb2f4b Valid from Wed Oct 25 04:32:46 EDT 2006 until Sat Oct 25 04:32:46 EDT 2036

adding as trusted cert: Subject: CN=CNNIC ROOT, O=CNNIC, C=CN Issuer: CN=CNNIC ROOT, O=CNNIC, C=CN Algorithm: RSA; Serial number: 0x49330001 Valid from Mon Apr 16 03:09:14 EDT 2007 until Fri Apr 16 03:09:14 EDT 2027

adding as trusted cert: Subject: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Issuer: CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US Algorithm: RSA; Serial number: 0x4a538c28 Valid from Tue Jul 07 13:25:54 EDT 2009 until Sat Dec 07 12:55:54 EST 2030

adding as trusted cert: Subject: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US Issuer: OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US Algorithm: RSA; Serial number: 0x0 Valid from Tue Jun 29 13:06:20 EDT 2004 until Thu Jun 29 13:06:20 EDT 2034

adding as trusted cert: Subject: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0xce7e0e517d846fe8fe560fc1bf03039 Valid from Thu Nov 09 19:00:00 EST 2006 until Sun Nov 09 19:00:00 EST 2031

adding as trusted cert: Subject: CN=Secure Global CA, O=SecureTrust Corporation, C=US Issuer: CN=Secure Global CA, O=SecureTrust Corporation, C=US Algorithm: RSA; Serial number: 0x75622a4e8d48a894df413c8f0f8eaa5 Valid from Tue Nov 07 14:42:28 EST 2006 until Mon Dec 31 14:52:06 EST 2029

adding as trusted cert: Subject: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 3 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network Issuer: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, OU=ValiCert Class 3 Policy Validation Authority, O="ValiCert, Inc.", L=ValiCert Validation Network Algorithm: RSA; Serial number: 0x1 Valid from Fri Jun 25 20:22:33 EDT 1999 until Tue Jun 25 20:22:33 EDT 2019

adding as trusted cert: Subject: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE Algorithm: RSA; Serial number: 0x1 Valid from Tue May 30 06:48:38 EDT 2000 until Sat May 30 06:48:38 EDT 2020

adding as trusted cert: Subject: CN=Secure Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=Secure Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Algorithm: RSA; Serial number: 0x1 Valid from Wed Dec 31 19:00:00 EST 2003 until Sun Dec 31 18:59:59 EST 2028

adding as trusted cert: Subject: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE Issuer: CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE Algorithm: RSA; Serial number: 0x1 Valid from Wed Oct 01 06:29:56 EDT 2008 until Sat Oct 01 19:59:59 EDT 2033

adding as trusted cert: Subject: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: EC; Serial number: 0x55556bcf25ea43535c3a40fd5ab4572 Valid from Thu Aug 01 08:00:00 EDT 2013 until Fri Jan 15 07:00:00 EST 2038

adding as trusted cert: Subject: CN=Swisscom Root CA 1, OU=Digital Certificate Services, O=Swisscom, C=ch Issuer: CN=Swisscom Root CA 1, OU=Digital Certificate Services, O=Swisscom, C=ch Algorithm: RSA; Serial number: 0x5c0b855c0be75941df57cc3f7f9da836 Valid from Thu Aug 18 08:06:20 EDT 2005 until Mon Aug 18 18:06:20 EDT 2025

adding as trusted cert: Subject: CN=PSCProcert, C=VE, O=Sistema Nacional de Certificacion Electronica, OU=Proveedor de Certificados PROCERT, ST=Miranda, L=Chacao, EMAILADDRESS=contacto@procert.net.ve Issuer: EMAILADDRESS=acraiz@suscerte.gob.ve, OU=Superintendencia de Servicios de Certificacion Electronica, O=Sistema Nacional de Certificacion Electronica, ST=Distrito Capital, L=Caracas, C=VE, CN=Autoridad de Certificacion Raiz del Estado Venezolano Algorithm: RSA; Serial number: 0xb Valid from Tue Dec 28 11:51:00 EST 2010 until Fri Dec 25 18:59:59 EST 2020

adding as trusted cert: Subject: CN=Juur-SK, O=AS Sertifitseerimiskeskus, C=EE, EMAILADDRESS=pki@sk.ee Issuer: CN=Juur-SK, O=AS Sertifitseerimiskeskus, C=EE, EMAILADDRESS=pki@sk.ee Algorithm: RSA; Serial number: 0x3b8e4bfc Valid from Thu Aug 30 10:23:01 EDT 2001 until Fri Aug 26 10:23:01 EDT 2016

adding as trusted cert: Subject: CN=GeoTrust Global CA 2, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Global CA 2, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x1 Valid from Thu Mar 04 00:00:00 EST 2004 until Mon Mar 04 00:00:00 EST 2019

adding as trusted cert: Subject: C=TR, O=EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., CN=EBG Elektronik Sertifika Hizmet Sağlayıcısı Issuer: C=TR, O=EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., CN=EBG Elektronik Sertifika Hizmet Sağlayıcısı Algorithm: RSA; Serial number: 0x4caf73421c8e7402 Valid from Wed Aug 16 20:21:09 EDT 2006 until Sat Aug 13 20:31:09 EDT 2016

adding as trusted cert: Subject: CN=Class 2 Primary CA, O=Certplus, C=FR Issuer: CN=Class 2 Primary CA, O=Certplus, C=FR Algorithm: RSA; Serial number: 0x85bd4bf3d8dae369f694d75fc3a54423 Valid from Wed Jul 07 13:05:00 EDT 1999 until Sat Jul 06 19:59:59 EDT 2019

adding as trusted cert: Subject: CN=OISTE WISeKey Global Root GA CA, OU=OISTE Foundation Endorsed, OU=Copyright (c) 2005, O=WISeKey, C=CH Issuer: CN=OISTE WISeKey Global Root GA CA, OU=OISTE Foundation Endorsed, OU=Copyright (c) 2005, O=WISeKey, C=CH Algorithm: RSA; Serial number: 0x413d72c7f46b1f81437df1d22854df9a Valid from Sun Dec 11 11:03:44 EST 2005 until Fri Dec 11 11:09:51 EST 2037

adding as trusted cert: Subject: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Issuer: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Algorithm: RSA; Serial number: 0x1 Valid from Wed Jul 31 20:00:00 EDT 1996 until Thu Dec 31 18:59:59 EST 2020

adding as trusted cert: Subject: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US Issuer: CN=GeoTrust Global CA, O=GeoTrust Inc., C=US Algorithm: RSA; Serial number: 0x23456 Valid from Tue May 21 00:00:00 EDT 2002 until Sat May 21 00:00:00 EDT 2022

adding as trusted cert: Subject: CN=Network Solutions Certificate Authority, O=Network Solutions L.L.C., C=US Issuer: CN=Network Solutions Certificate Authority, O=Network Solutions L.L.C., C=US Algorithm: RSA; Serial number: 0x57cb336fc25c16e6471617e3903168e0 Valid from Thu Nov 30 19:00:00 EST 2006 until Mon Dec 31 18:59:59 EST 2029

adding as trusted cert: Subject: CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN Issuer: CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN Algorithm: RSA; Serial number: 0x184accd6 Valid from Tue Aug 07 23:07:01 EDT 2012 until Sun Dec 30 22:07:01 EST 2029

adding as trusted cert: Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5 Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5 Algorithm: EC; Serial number: 0x605949e0262ebb55f90a778a71f94ad86c Valid from Mon Nov 12 19:00:00 EST 2012 until Mon Jan 18 22:14:07 EST 2038

adding as trusted cert: Subject: CN=CA Disig, O=Disig a.s., L=Bratislava, C=SK Issuer: CN=CA Disig, O=Disig a.s., L=Bratislava, C=SK Algorithm: RSA; Serial number: 0x1 Valid from Tue Mar 21 20:39:34 EST 2006 until Mon Mar 21 21:39:34 EDT 2016

adding as trusted cert: Subject: CN=Hellenic Academic and Research Institutions RootCA 2011, O=Hellenic Academic and Research Institutions Cert. Authority, C=GR Issuer: CN=Hellenic Academic and Research Institutions RootCA 2011, O=Hellenic Academic and Research Institutions Cert. Authority, C=GR Algorithm: RSA; Serial number: 0x0 Valid from Tue Dec 06 08:49:52 EST 2011 until Mon Dec 01 08:49:52 EST 2031

adding as trusted cert: Subject: CN=CA WoSign ECC Root, O=WoSign CA Limited, C=CN Issuer: CN=CA WoSign ECC Root, O=WoSign CA Limited, C=CN Algorithm: EC; Serial number: 0x684a5870806bf08f02faf6dee8b09090 Valid from Fri Nov 07 19:58:58 EST 2014 until Mon Nov 07 19:58:58 EST 2044

adding as trusted cert: Subject: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Issuer: CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Algorithm: RSA; Serial number: 0x0 Valid from Mon Aug 31 20:00:00 EDT 2009 until Thu Dec 31 18:59:59 EST 2037

adding as trusted cert: Subject: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net Issuer: CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net Algorithm: RSA; Serial number: 0x3863def8 Valid from Fri Dec 24 12:50:51 EST 1999 until Tue Jul 24 10:15:12 EDT 2029

adding as trusted cert: Subject: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US Issuer: CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US Algorithm: RSA; Serial number: 0xa0142800000014523cf467c00000002 Valid from Thu Jan 16 12:53:32 EST 2014 until Mon Jan 16 12:53:32 EST 2034

adding as trusted cert: Subject: CN=Staat der Nederlanden Root CA - G3, O=Staat der Nederlanden, C=NL Issuer: CN=Staat der Nederlanden Root CA - G3, O=Staat der Nederlanden, C=NL Algorithm: RSA; Serial number: 0x98a239 Valid from Thu Nov 14 06:28:42 EST 2013 until Mon Nov 13 18:00:00 EST 2028

adding as trusted cert: Subject: CN=TeliaSonera Root CA v1, O=TeliaSonera Issuer: CN=TeliaSonera Root CA v1, O=TeliaSonera Algorithm: RSA; Serial number: 0x95be16a0f72e46f17b398272fa8bcd96 Valid from Thu Oct 18 08:00:50 EDT 2007 until Mon Oct 18 08:00:50 EDT 2032

adding as trusted cert: Subject: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US Issuer: CN=thawte Primary Root CA, OU="(c) 2006 thawte, Inc. - For authorized use only", OU=Certification Services Division, O="thawte, Inc.", C=US Algorithm: RSA; Serial number: 0x344ed55720d5edec49f42fce37db2b6d Valid from Thu Nov 16 19:00:00 EST 2006 until Wed Jul 16 19:59:59 EDT 2036

adding as trusted cert: Subject: EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Issuer: EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, ST=Western Cape, C=ZA Algorithm: RSA; Serial number: 0x1 Valid from Wed Jul 31 20:00:00 EDT 1996 until Thu Dec 31 18:59:59 EST 2020

adding as trusted cert: Subject: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US Issuer: CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US Algorithm: RSA; Serial number: 0x0 Valid from Mon Aug 31 20:00:00 EDT 2009 until Thu Dec 31 18:59:59 EST 2037

adding as trusted cert: Subject: CN=Visa eCommerce Root, OU=Visa International Service Association, O=VISA, C=US Issuer: CN=Visa eCommerce Root, OU=Visa International Service Association, O=VISA, C=US Algorithm: RSA; Serial number: 0x1386354d1d3f06f2c1f96505d5901c62 Valid from Tue Jun 25 22:18:36 EDT 2002 until Thu Jun 23 20:16:12 EDT 2022

adding as trusted cert: Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G4, OU="(c) 2007 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: EC; Serial number: 0x2f80fe238c0e220f486712289187acb3 Valid from Sun Nov 04 19:00:00 EST 2007 until Mon Jan 18 18:59:59 EST 2038

adding as trusted cert: Subject: CN=Staat der Nederlanden EV Root CA, O=Staat der Nederlanden, C=NL Issuer: CN=Staat der Nederlanden EV Root CA, O=Staat der Nederlanden, C=NL Algorithm: RSA; Serial number: 0x98968d Valid from Wed Dec 08 06:19:29 EST 2010 until Thu Dec 08 06:10:28 EST 2022

adding as trusted cert: Subject: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US Issuer: CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US Algorithm: RSA; Serial number: 0x456b5054 Valid from Mon Nov 27 15:23:42 EST 2006 until Fri Nov 27 15:53:42 EST 2026

adding as trusted cert: Subject: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES Issuer: CN=Root CA Generalitat Valenciana, OU=PKIGVA, O=Generalitat Valenciana, C=ES Algorithm: RSA; Serial number: 0x3b45e568 Valid from Fri Jul 06 12:22:47 EDT 2001 until Thu Jul 01 11:22:47 EDT 2021

adding as trusted cert: Subject: CN=Certification Authority of WoSign G2, O=WoSign CA Limited, C=CN Issuer: CN=Certification Authority of WoSign G2, O=WoSign CA Limited, C=CN Algorithm: RSA; Serial number: 0x6b25da8a889d7cbc0f05b3b17a614544 Valid from Fri Nov 07 19:58:58 EST 2014 until Mon Nov 07 19:58:58 EST 2044

adding as trusted cert: Subject: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: RSA; Serial number: 0xb931c3ad63967ea6723bfc3af9af44b Valid from Thu Aug 01 08:00:00 EDT 2013 until Fri Jan 15 07:00:00 EST 2038

adding as trusted cert: Subject: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL Issuer: CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL Algorithm: RSA; Serial number: 0x2d Valid from Sun Sep 17 15:46:37 EDT 2006 until Wed Sep 17 15:46:36 EDT 2036

adding as trusted cert: Subject: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Issuer: CN=Certum CA, O=Unizeto Sp. z o.o., C=PL Algorithm: RSA; Serial number: 0x10020 Valid from Tue Jun 11 06:46:39 EDT 2002 until Fri Jun 11 06:46:39 EDT 2027

adding as trusted cert: Subject: CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK Issuer: CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK Algorithm: RSA; Serial number: 0x92b888dbb08ac163 Valid from Thu Jul 19 05:15:30 EDT 2012 until Sat Jul 19 05:15:30 EDT 2042

adding as trusted cert: Subject: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Qualified CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Algorithm: RSA; Serial number: 0x1 Valid from Tue May 30 06:44:50 EDT 2000 until Sat May 30 06:44:50 EDT 2020

adding as trusted cert: Subject: CN=DST Root CA X3, O=Digital Signature Trust Co. Issuer: CN=DST Root CA X3, O=Digital Signature Trust Co. Algorithm: RSA; Serial number: 0x44afb080d6a327ba893039862ef8406b Valid from Sat Sep 30 17:12:19 EDT 2000 until Thu Sep 30 10:01:15 EDT 2021

adding as trusted cert: Subject: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO Issuer: CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO Algorithm: RSA; Serial number: 0x2 Valid from Tue Oct 26 04:38:03 EDT 2010 until Fri Oct 26 04:38:03 EDT 2040

adding as trusted cert: Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x70bae41d10d92934b638ca7b03ccbabf Valid from Sun Jan 28 19:00:00 EST 1996 until Tue Aug 01 19:59:59 EDT 2028

adding as trusted cert: Subject: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE Issuer: CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE Algorithm: RSA; Serial number: 0x983f4 Valid from Thu Nov 05 03:50:46 EST 2009 until Mon Nov 05 03:50:46 EST 2029

adding as trusted cert: Subject: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Issuer: CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US Algorithm: EC; Serial number: 0xba15afa1ddfa0b54944afcd24a06cec Valid from Thu Aug 01 08:00:00 EDT 2013 until Fri Jan 15 07:00:00 EST 2038

adding as trusted cert: Subject: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH Issuer: CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH Algorithm: RSA; Serial number: 0xbb401c43f55e4fb0 Valid from Wed Oct 25 04:30:35 EDT 2006 until Sat Oct 25 04:30:35 EDT 2036

adding as trusted cert: Subject: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Issuer: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Algorithm: EC; Serial number: 0x5c8b99c55a94c5d27156decd8980cc26 Valid from Sun Jan 31 19:00:00 EST 2010 until Mon Jan 18 18:59:59 EST 2038

adding as trusted cert: Subject: OU=certSIGN ROOT CA, O=certSIGN, C=RO Issuer: OU=certSIGN ROOT CA, O=certSIGN, C=RO Algorithm: RSA; Serial number: 0x200605167002 Valid from Tue Jul 04 13:20:04 EDT 2006 until Fri Jul 04 13:20:04 EDT 2031

adding as trusted cert: Subject: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x509 Valid from Fri Nov 24 13:27:00 EST 2006 until Mon Nov 24 13:23:33 EST 2031

adding as trusted cert: Subject: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US Issuer: CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US Algorithm: RSA; Serial number: 0xa0142800000014523c844b500000002 Valid from Thu Jan 16 13:12:23 EST 2014 until Mon Jan 16 13:12:23 EST 2034

adding as trusted cert: Subject: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x78585f2ead2c194be3370735341328b596d46593 Valid from Thu Jan 12 12:27:44 EST 2012 until Sun Jan 12 12:27:44 EST 2042

adding as trusted cert: Subject: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE Issuer: CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE Algorithm: RSA; Serial number: 0x983f3 Valid from Thu Nov 05 03:35:58 EST 2009 until Mon Nov 05 03:35:58 EST 2029

adding as trusted cert: Subject: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE Issuer: CN=Deutsche Telekom Root CA 2, OU=T-TeleSec Trust Center, O=Deutsche Telekom AG, C=DE Algorithm: RSA; Serial number: 0x26 Valid from Fri Jul 09 08:11:00 EDT 1999 until Tue Jul 09 19:59:00 EDT 2019

adding as trusted cert: Subject: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Issuer: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US Algorithm: RSA; Serial number: 0x1fd6d30fca3ca51a81bbc640e35032d Valid from Sun Jan 31 19:00:00 EST 2010 until Mon Jan 18 18:59:59 EST 2038

adding as trusted cert: Subject: CN=Izenpe.com, O=IZENPE S.A., C=ES Issuer: CN=Izenpe.com, O=IZENPE S.A., C=ES Algorithm: RSA; Serial number: 0xb0b75a16485fbfe1cbf58bd719e67d Valid from Thu Dec 13 08:08:28 EST 2007 until Sun Dec 13 03:27:25 EST 2037

adding as trusted cert: Subject: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 Issuer: CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R2 Algorithm: RSA; Serial number: 0x400000000010f8626e60d Valid from Fri Dec 15 03:00:00 EST 2006 until Wed Dec 15 03:00:00 EST 2021

adding as trusted cert: Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G5, OU="(c) 2006 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x18dad19e267de8bb4a2158cdcc6b3b4a Valid from Tue Nov 07 19:00:00 EST 2006 until Wed Jul 16 19:59:59 EDT 2036

adding as trusted cert: Subject: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x5c6 Valid from Fri Nov 24 14:11:23 EST 2006 until Mon Nov 24 14:06:44 EST 2031

adding as trusted cert: Subject: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Issuer: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US Algorithm: RSA; Serial number: 0x0 Valid from Mon Aug 31 20:00:00 EDT 2009 until Thu Dec 31 18:59:59 EST 2037

adding as trusted cert: Subject: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR Issuer: CN=TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6, O=TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş., L=Ankara, C=TR Algorithm: RSA; Serial number: 0x7da1f265ec8a Valid from Wed Dec 18 04:04:10 EST 2013 until Sat Dec 16 04:04:10 EST 2023

adding as trusted cert: Subject: CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH Issuer: CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH Algorithm: RSA; Serial number: 0x76b1205274f0858746b3f8231af6c2c0 Valid from Mon Dec 01 10:00:32 EST 2014 until Thu Dec 01 10:10:31 EST 2039

adding as trusted cert: Subject: CN=WellsSecure Public Root Certificate Authority, OU=Wells Fargo Bank NA, O=Wells Fargo WellsSecure, C=US Issuer: CN=WellsSecure Public Root Certificate Authority, OU=Wells Fargo Bank NA, O=Wells Fargo WellsSecure, C=US Algorithm: RSA; Serial number: 0x1 Valid from Thu Dec 13 12:07:54 EST 2007 until Tue Dec 13 19:07:54 EST 2022

adding as trusted cert: Subject: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch Issuer: CN=Swisscom Root CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch Algorithm: RSA; Serial number: 0x1e9e28e848f2e5efc37c4a1e5a1867b6 Valid from Fri Jun 24 04:38:14 EDT 2011 until Wed Jun 25 03:38:14 EDT 2031

adding as trusted cert: Subject: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d Valid from Thu Jan 12 15:26:32 EST 2012 until Sun Jan 12 15:26:32 EST 2042

adding as trusted cert: Subject: EMAILADDRESS=info@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU Issuer: EMAILADDRESS=info@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU Algorithm: RSA; Serial number: 0xc27e43044e473f19 Valid from Tue Jun 16 07:30:18 EDT 2009 until Sun Dec 30 06:30:18 EST 2029

adding as trusted cert: Subject: CN=StartCom Certification Authority G2, O=StartCom Ltd., C=IL Issuer: CN=StartCom Certification Authority G2, O=StartCom Ltd., C=IL Algorithm: RSA; Serial number: 0x3b Valid from Thu Dec 31 20:00:01 EST 2009 until Sat Dec 31 18:59:01 EST 2039

adding as trusted cert: Subject: CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU Issuer: CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU Algorithm: RSA; Serial number: 0x49412ce40010 Valid from Thu Dec 11 10:08:21 EST 2008 until Wed Dec 06 10:08:21 EST 2028

adding as trusted cert: Subject: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT Issuer: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT Algorithm: RSA; Serial number: 0x570a119742c4e3cc Valid from Thu Sep 22 07:22:02 EDT 2011 until Sun Sep 22 07:22:02 EDT 2030

adding as trusted cert: Subject: CN=TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3, OU=Kamu Sertifikasyon Merkezi, OU=Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü - UEKAE, O=Türkiye Bilimsel ve Teknolojik Araştırma Kurumu - TÜBİTAK, L=Gebze - Kocaeli, C=TR Issuer: CN=TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3, OU=Kamu Sertifikasyon Merkezi, OU=Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü - UEKAE, O=Türkiye Bilimsel ve Teknolojik Araştırma Kurumu - TÜBİTAK, L=Gebze - Kocaeli, C=TR Algorithm: RSA; Serial number: 0x11 Valid from Fri Aug 24 07:37:07 EDT 2007 until Mon Aug 21 07:37:07 EDT 2017

adding as trusted cert: Subject: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES Issuer: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES Algorithm: RSA; Serial number: 0x53ec3beefbb2485f Valid from Wed May 20 04:38:15 EDT 2009 until Tue Dec 31 03:38:15 EST 2030

adding as trusted cert: Subject: CN=Certigna, O=Dhimyotis, C=FR Issuer: CN=Certigna, O=Dhimyotis, C=FR Algorithm: RSA; Serial number: 0xfedce3010fc948ff Valid from Fri Jun 29 11:13:05 EDT 2007 until Tue Jun 29 11:13:05 EDT 2027

adding as trusted cert: Subject: CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR Issuer: CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR Algorithm: RSA; Serial number: 0x6a683e9c519bcb53 Valid from Tue Mar 05 07:09:48 EST 2013 until Fri Mar 03 07:09:48 EST 2023

adding as trusted cert: Subject: CN=AddTrust Public CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Public CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Algorithm: RSA; Serial number: 0x1 Valid from Tue May 30 06:41:50 EDT 2000 until Sat May 30 06:41:50 EDT 2020

adding as trusted cert: Subject: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1 Issuer: C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1 Algorithm: RSA; Serial number: 0x5ec3b7a6437fa4e0 Valid from Thu May 05 05:37:37 EDT 2011 until Tue Dec 31 04:37:37 EST 2030

adding as trusted cert: Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x3c9131cb1ff6d01b0e9ab8d044bf12be Valid from Sun Jan 28 19:00:00 EST 1996 until Wed Aug 02 19:59:59 EDT 2028

adding as trusted cert: Subject: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM Issuer: CN=QuoVadis Root Certification Authority, OU=Root Certification Authority, O=QuoVadis Limited, C=BM Algorithm: RSA; Serial number: 0x3ab6508b Valid from Mon Mar 19 13:33:33 EST 2001 until Wed Mar 17 14:33:33 EDT 2021

adding as trusted cert: Subject: CN=Buypass Class 2 CA 1, O=Buypass AS-983163327, C=NO Issuer: CN=Buypass Class 2 CA 1, O=Buypass AS-983163327, C=NO Algorithm: RSA; Serial number: 0x1 Valid from Fri Oct 13 06:25:09 EDT 2006 until Thu Oct 13 06:25:09 EDT 2016

adding as trusted cert: Subject: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP Issuer: OU=Security Communication EV RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP Algorithm: RSA; Serial number: 0x0 Valid from Tue Jun 05 22:12:32 EDT 2007 until Fri Jun 05 22:12:32 EDT 2037

adding as trusted cert: Subject: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO Issuer: CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO Algorithm: RSA; Serial number: 0x2 Valid from Tue Oct 26 04:28:58 EDT 2010 until Fri Oct 26 04:28:58 EDT 2040

adding as trusted cert: Subject: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US Issuer: CN=thawte Primary Root CA - G2, OU="(c) 2007 thawte, Inc. - For authorized use only", O="thawte, Inc.", C=US Algorithm: EC; Serial number: 0x35fc265cd9844fc93d263d579baed756 Valid from Sun Nov 04 19:00:00 EST 2007 until Mon Jan 18 18:59:59 EST 2038

adding as trusted cert: Subject: CN=Swisscom Root EV CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch Issuer: CN=Swisscom Root EV CA 2, OU=Digital Certificate Services, O=Swisscom, C=ch Algorithm: RSA; Serial number: 0xf2fa64e27463d38dfd101d041f76ca58 Valid from Fri Jun 24 05:45:08 EDT 2011 until Wed Jun 25 04:45:08 EDT 2031

adding as trusted cert: Subject: CN=NetLock Kozjegyzoi (Class A) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, ST=Hungary, C=HU Issuer: CN=NetLock Kozjegyzoi (Class A) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, ST=Hungary, C=HU Algorithm: RSA; Serial number: 0x103 Valid from Wed Feb 24 18:14:47 EST 1999 until Tue Feb 19 18:14:47 EST 2019

adding as trusted cert: Subject: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Issuer: CN=VeriSign Universal Root Certification Authority, OU="(c) 2008 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US Algorithm: RSA; Serial number: 0x401ac46421b31321030ebbe4121ac51d Valid from Tue Apr 01 20:00:00 EDT 2008 until Tue Dec 01 18:59:59 EST 2037

adding as trusted cert: Subject: CN=China Internet Network Information Center EV Certificates Root, O=China Internet Network Information Center, C=CN Issuer: CN=China Internet Network Information Center EV Certificates Root, O=China Internet Network Information Center, C=CN Algorithm: RSA; Serial number: 0x489f0001 Valid from Tue Aug 31 03:11:25 EDT 2010 until Sat Aug 31 03:11:25 EDT 2030

adding as trusted cert: Subject: CN=Cybertrust Global Root, O="Cybertrust, Inc" Issuer: CN=Cybertrust Global Root, O="Cybertrust, Inc" Algorithm: RSA; Serial number: 0x400000000010f85aa2d48 Valid from Fri Dec 15 03:00:00 EST 2006 until Wed Dec 15 03:00:00 EST 2021

adding as trusted cert: Subject: OU=ApplicationCA, O=Japanese Government, C=JP Issuer: OU=ApplicationCA, O=Japanese Government, C=JP Algorithm: RSA; Serial number: 0x31 Valid from Wed Dec 12 10:00:00 EST 2007 until Tue Dec 12 10:00:00 EST 2017

adding as trusted cert: Subject: CN=Trusted Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Issuer: CN=Trusted Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Algorithm: RSA; Serial number: 0x1 Valid from Wed Dec 31 19:00:00 EST 2003 until Sun Dec 31 18:59:59 EST 2028

adding as trusted cert: Subject: CN=Global Chambersign Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU Issuer: CN=Global Chambersign Root, OU=http://www.chambersign.org, O=AC Camerfirma SA CIF A82743287, C=EU Algorithm: RSA; Serial number: 0x0 Valid from Tue Sep 30 12:14:18 EDT 2003 until Wed Sep 30 12:14:18 EDT 2037

adding as trusted cert: Subject: OU=Trustis FPS Root CA, O=Trustis Limited, C=GB Issuer: OU=Trustis FPS Root CA, O=Trustis Limited, C=GB Algorithm: RSA; Serial number: 0x1b1fadb620f924d3366bf7c7f18ca059 Valid from Tue Dec 23 07:14:06 EST 2003 until Sun Jan 21 06:36:54 EST 2024

adding as trusted cert: Subject: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Issuer: CN=AddTrust Class 1 CA Root, OU=AddTrust TTP Network, O=AddTrust AB, C=SE Algorithm: RSA; Serial number: 0x1 Valid from Tue May 30 06:38:31 EDT 2000 until Sat May 30 06:38:31 EDT 2020

adding as trusted cert: Subject: CN=NetLock Uzleti (Class B) Tanusitvanykiado, OU=Tanusitvanykiadok, O=NetLock Halozatbiztonsagi Kft., L=Budapest, C=HU Issuer: CN=NetLock Uzleti (

mikjo commented 7 years ago

I just reproduced this on a system that definitely has no proxy in place. I was trying to reproduce #570 on a system without a mysql database and without a proxy to make sure it was a clean reproducer, but instead ran into this issue. It looks to me like a protocol error; I was expecting no cipher suites in common but I just see the connection reset; see the bottom of this gist

dayer4b commented 7 years ago

this is happening for me too. Installing and using Oracle java makes the problem go away

jeremylong commented 7 years ago

@mikjo looking at the log you provided via gist - can you confirm if that is from dependency-check 1.4.2 or 1.4.3? It looks like it would be from 1.4.2 - the algorithm list was removed from dependency-check and that resolved the issue with lines like this from the javax.net.debug log:

Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

I am still having trouble replicating this issue. I just installed Ubuntu 16.04, ran sudo apt-get install openjdk-8-jre, and then ran dependency-check and everything worked:

jeremy@box:/media/sf_box/dependency-check/bin$ ./dependency-check.sh --updateonly
[INFO] Checking for updates
[INFO] NVD CVE requires several updates; this could take a couple of minutes.
[INFO] Download Started for NVD CVE - 2004
[INFO] Download Started for NVD CVE - 2003
[INFO] Download Started for NVD CVE - 2002
[INFO] Download Complete for NVD CVE - 2003  (1468 ms)
[INFO] Download Started for NVD CVE - 2005
[INFO] Processing Started for NVD CVE - 2003
[INFO] Download Complete for NVD CVE - 2004  (1836 ms)
[INFO] Download Started for NVD CVE - 2006
[INFO] Download Complete for NVD CVE - 2002  (2253 ms)
[INFO] Download Started for NVD CVE - 2007
[INFO] Download Complete for NVD CVE - 2005  (2093 ms)
[INFO] Download Started for NVD CVE - 2008
[INFO] Download Complete for NVD CVE - 2006  (2862 ms)
[INFO] Download Started for NVD CVE - 2009
[INFO] Download Complete for NVD CVE - 2007  (2740 ms)
[INFO] Download Started for NVD CVE - 2010
[INFO] Download Complete for NVD CVE - 2008  (2769 ms)
[INFO] Download Started for NVD CVE - 2011
[INFO] Download Complete for NVD CVE - 2009  (2797 ms)
[INFO] Download Started for NVD CVE - 2012
[INFO] Download Complete for NVD CVE - 2010  (3497 ms)
[INFO] Download Started for NVD CVE - 2013
[INFO] Download Complete for NVD CVE - 2012  (4182 ms)
[INFO] Download Started for NVD CVE - 2014
[INFO] Processing Complete for NVD CVE - 2003  (10384 ms)
[INFO] Processing Started for NVD CVE - 2004
[INFO] Download Complete for NVD CVE - 2013  (4115 ms)
[INFO] Download Started for NVD CVE - 2015
[INFO] Download Complete for NVD CVE - 2011  (6589 ms)
[INFO] Download Started for NVD CVE - 2016
[INFO] Download Complete for NVD CVE - 2014  (2833 ms)
[INFO] Download Started for NVD CVE - Modified
[INFO] Download Complete for NVD CVE - 2015  (2331 ms)
[INFO] Download Complete for NVD CVE - 2016  (2150 ms)
[INFO] Download Complete for NVD CVE - Modified  (1281 ms)
[INFO] Processing Complete for NVD CVE - 2004  (10252 ms)
[INFO] Processing Started for NVD CVE - 2002
[INFO] Processing Complete for NVD CVE - 2002  (6138 ms)
[INFO] Processing Started for NVD CVE - 2005
[INFO] Processing Complete for NVD CVE - 2005  (6469 ms)
[INFO] Processing Started for NVD CVE - 2006
[INFO] Processing Complete for NVD CVE - 2006  (9723 ms)
[INFO] Processing Started for NVD CVE - 2007
[INFO] Processing Complete for NVD CVE - 2007  (9736 ms)
[INFO] Processing Started for NVD CVE - 2008
[INFO] Processing Complete for NVD CVE - 2008  (15926 ms)
[INFO] Processing Started for NVD CVE - 2009
[INFO] Processing Complete for NVD CVE - 2009  (22103 ms)
[INFO] Processing Started for NVD CVE - 2010
[INFO] Processing Complete for NVD CVE - 2010  (33365 ms)
[INFO] Processing Started for NVD CVE - 2012
[INFO] Processing Complete for NVD CVE - 2012  (38186 ms)
[INFO] Processing Started for NVD CVE - 2013
[INFO] Processing Complete for NVD CVE - 2013  (30386 ms)
[INFO] Processing Started for NVD CVE - 2011
[INFO] Processing Complete for NVD CVE - 2011  (312469 ms)
[INFO] Processing Started for NVD CVE - 2014
[INFO] Processing Complete for NVD CVE - 2014  (21286 ms)
[INFO] Processing Started for NVD CVE - 2015
[INFO] Processing Complete for NVD CVE - 2015  (12322 ms)
[INFO] Processing Started for NVD CVE - 2016
[INFO] Processing Complete for NVD CVE - 2016  (8086 ms)
[INFO] Processing Started for NVD CVE - Modified
[INFO] Processing Complete for NVD CVE - Modified  (38446 ms)
[INFO] Begin database maintenance.
[INFO] End database maintenance.
[INFO] Check for updates complete (601412 ms)
jeremy@box:/media/sf_box/dependency-check/bin$ java -version
openjdk version "1.8.0_91"
OpenJDK Runtime Environment (build 1.8.0_91-8u91-b14-3ubuntu1~16.04.1-b14)
OpenJDK 64-Bit Server VM (build 25.91-b14, mixed mode)
johnsonm commented 7 years ago

I was @mikjo while I was at SAS; I am now posting from my personal account. The tests at SAS were on CentOS 7 and RHEL 7. I don't have access to those systems to re-test. Those were the tests running through a proxy.

For the tests not running through a proxy, I ran them on machines of my own. I definitely downloaded what was advertised as 1.4.3. Perhaps you accidentally posted 1.4.2 as 1.4.3? I no longer have the environment that I created for doing that test. The download was in a tmpfs /tmp, and I have since rebooted, so I don't have that download. I was running Fedora 23 at the time, and have since updated the system to Fedora 24, so I don't even have the same system software running.

I don't know whether Red Hat removes some encryption algorithms from their builds of OpenJDK due to patent concerns.

jeremylong commented 7 years ago

There have been two issues open trying to resolve this issue. I have posted the solution to the other thread in issue#523. Short answer, if you are running into this problem install and use Bouncy Castle.

lpearson05 commented 7 years ago

FYI: The latest OpenJDK is working for me without BouncyCastle.

$ java -version
openjdk version "1.8.0_111"
OpenJDK Runtime Environment (build 1.8.0_111-b15)
OpenJDK 64-Bit Server VM (build 25.111-b15, mixed mode)

more environment info in original comment on #523

lock[bot] commented 5 years ago

This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs.