0

I have a JAVA Web Application in a Tomcat 7 with JDK 8 . My cacert file path and password is defined in setenv.sh file and has all needed certificates.

My initiates and is able to make some HTTPS connections with a server, but, after some time, a javax.net.ssl.SSLHandshakeException starts do occurs. If I reestart the server or redeploy the applications, everything works again.

I am using commons-httpclient-3.1-jbossorg-1.jar.

Here my setenv.sh configuration:

-Djavax.net.ssl.trustStore=/mypath/cacerts -Djavax.net.ssl.trustStorePassword=changeit

Here the code that starts the connection:

private Object execute(HttpMethod method, boolean returnAsString) throws HTTPMetodosException {
    MultiThreadedHttpConnectionManager cm = new MultiThreadedHttpConnectionManager();
    HttpConnectionManagerParams param = cm.getParams();
    param.setConnectionTimeout(60000);
    param.setSoTimeout(60000);

    HttpClient client = new HttpClient(cm);
    try {
        int httpStatus = client.executeMethod(method);
        if (httpStatus != 200) {
            if (httpStatus == 401) {
                throw new HTTPMetodosException(
                        String.format("A requisição não foi autorizada. Verifique os paramêtros de autenticação e/ou seu certificado digital.;HTTP Status: %d.;", httpStatus) + method.getResponseBodyAsString());
            } else if (httpStatus > 220) {
                throw new HTTPMetodosException(String.format("A requisição falhou.;HTTP Status: %d.;", httpStatus) + method.getResponseBodyAsString());
            }
        }
        if (returnAsString)
            return new String(IOUtils.toByteArray(method.getResponseBodyAsStream()));
        else {
            byte[] targetArray = method.getResponseBody();
            return targetArray;
        }
    } catch (Exception e) {
        e.printStackTrace();
        logger.error(e, e.getCause());
        throw new HTTPMetodosException("A requisição falhou. Tente novamente.; Mensagem Erro:" + e.getMessage());
    } finally {
        method.releaseConnection();
    }
}

And here when the error presents:

 2022-05-20 13:35:51 ERROR MontarWSdoRPS_SpeedNotas:191 - Enviando plugnotasnnfse para o link https://api.plugnotas.com.br/nfse.
2022-05-20 13:35:51 ERROR MontarWSdoRPS_SpeedNotas:198 - /usr/sisdedetizadora/cacerts
2022-05-20 13:35:51 ERROR MontarWSdoRPS_SpeedNotas:200 - /usr/sisdedetizadora/cacerts
%% Initialized:  [Session-97933, SSL_NULL_WITH_NULL_NULL]
https-jsse-nio-443-exec-298, WRITE: TLSv1.2 Application Data, length = 356
https-jsse-nio-443-exec-392, WRITE: TLSv1.2 Application Data, length = 16384
https-jsse-nio-443-exec-392, WRITE: TLSv1.2 Application Data, length = 532
https-jsse-nio-443-exec-392, WRITE: TLSv1.2 Application Data, length = 144
https-jsse-nio-443-exec-392, WRITE: TLSv1.2 Application Data, length = 20
Allow unsafe renegotiation: false
Allow legacy hello messages: true
Is initial handshake: true
Is secure renegotiation: false
pool-852-thread-1, setSoTimeout(60000) called
pool-852-thread-1, setSoTimeout(60000) called
%% No cached client session
update handshake state: client_hello[1]
upcoming handshake states: server_hello[2]
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 1636221799 bytes = { 89, 12, 141, 138, 239, 130, 132, 3, 155, 160, 110, 251, 189, 199, 214, 198, 223, 100, 136, 110, 229, 176, 55, 118, 146, 112, 246, 192 }
Session ID:  {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods:  { 0 }
Extension elliptic_curves, curve names: {secp256r1, secp384r1, secp521r1}
Extension ec_point_formats, formats: [uncompressed]
Extension signature_algorithms, signature_algorithms: SHA512withECDSA, SHA512withRSA, SHA384withECDSA, SHA384withRSA, SHA256withECDSA, SHA256withRSA, SHA256withDSA, SHA224withECDSA, SHA224withRSA, SHA224withDSA, SHA1withECDSA, SHA1withRSA, SHA1withDSA
Extension extended_master_secret
Extension server_name, server_name: [type=host_name (0), value=api.plugnotas.com.br]
***
pool-852-thread-1, WRITE: TLSv1.2 Handshake, length = 214
pool-852-thread-1, READ: TLSv1.2 Handshake, length = 89
check handshake state: server_hello[2]
*** ServerHello, TLSv1.2
RandomCookie:  GMT: -9111016 bytes = { 147, 179, 122, 135, 245, 85, 72, 73, 185, 226, 237, 128, 4, 223, 207, 149, 28, 220, 215, 70, 160, 236, 93, 196, 195, 1, 71, 162 }
Session ID:  {205, 150, 163, 123, 123, 77, 89, 161, 188, 108, 79, 108, 210, 105, 217, 47, 134, 90, 46, 195, 13, 198, 104, 228, 202, 171, 160, 241, 147, 193, 22, 232}
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
Extension ec_point_formats, formats: [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
***
%% Initialized:  [Session-97934, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256]
** TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
update handshake state: server_hello[2]
upcoming handshake states: server certificate[11]
upcoming handshake states: server_key_exchange[12](optional)
upcoming handshake states: certificate_request[13](optional)
upcoming handshake states: server_hello_done[14]
upcoming handshake states: client certificate[11](optional)
upcoming handshake states: client_key_exchange[16]
upcoming handshake states: certificate_verify[15](optional)
upcoming handshake states: client change_cipher_spec[-1]
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
pool-852-thread-1, READ: TLSv1.2 Handshake, length = 4957
check handshake state: certificate[11]
update handshake state: certificate[11]
upcoming handshake states: server_key_exchange[12](optional)
upcoming handshake states: certificate_request[13](optional)
upcoming handshake states: server_hello_done[14]
upcoming handshake states: client certificate[11](optional)
upcoming handshake states: client_key_exchange[16]
upcoming handshake states: certificate_verify[15](optional)
upcoming handshake states: client change_cipher_spec[-1]
upcoming handshake states: client finished[20]
upcoming handshake states: server change_cipher_spec[-1]
upcoming handshake states: server finished[20]
*** Certificate chain
chain [0] = [
[
  Version: V3
  Subject: CN=plugnotas.com.br
  Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11

  Key:  Sun RSA public key, 2048 bits
  params: null
  modulus: 25275817432164159188092905493909437431745047507363725161465662192710974126816332884177370972183896578600148795516757424856364983578227315864150947308858744638947050621070019746052002081793411816135044216483886970037904632848744166094170528463639391421688859163800465117643032932130837975453307807295827667498933024189180702003465623892493683585168290462883591006792972310045853670938684106440909857396544283925427102557489956448440904880877091849683420836240372479899244518686629414116203275633912554887492687516631983179828469667359200404483103411172953483157552445842951420602558283538666576109204624685467972771433
  public exponent: 65537
  Validity: [From: Sun Jul 11 21:00:00 BRT 2021,
               To: Wed Aug 10 20:59:59 BRT 2022]
  Issuer: CN=Amazon, OU=Server CA 1B, O=Amazon, C=US
  SerialNumber: [    025d1f06 53b5bbab 6449a0a0 0344de0e]

Certificate Extensions: 10
[1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=false
Extension unknown: DER encoded OCTET string =
0000: 04 82 01 6E 04 82 01 6A   01 68 00 76 00 29 79 BE  ...n...j.h.v.)y.
0010: F0 9E 39 39 21 F0 56 73   9F 63 A5 77 E5 BE 57 7D  ..99!.Vs.c.w..W.
0020: 9C 60 0A F8 F9 4D 5D 26   5C 25 5D C7 84 00 00 01  .`...M]&\%].....
0030: 7A 98 F2 5C B1 00 00 04   03 00 47 30 45 02 20 19  z..\......G0E. .
0040: 9C 63 D5 A7 F8 11 E7 9E   B2 06 E0 C4 88 19 F3 0F  .c..............
0050: 6A EE C5 24 0A 36 37 6F   92 D8 6A EC D3 F6 1B 02  j..$.67o..j.....
0060: 21 00 CC 30 22 25 EE F3   00 24 98 58 60 BF 32 4A  !..0"%...$.X`.2J
0070: F5 29 7C B5 75 DB FF AB   54 33 19 85 F0 C5 83 E0  .)..u...T3......
0080: 8A 4C 00 76 00 51 A3 B0   F5 FD 01 79 9C 56 6D B8  .L.v.Q.....y.Vm.
0090: 37 78 8F 0C A4 7A CC 1B   27 CB F7 9E 88 42 9A 0D  7x...z..'....B..
00A0: FE D4 8B 05 E5 00 00 01   7A 98 F2 5C EB 00 00 04  ........z..\....
00B0: 03 00 47 30 45 02 20 1F   14 B0 C6 67 53 47 CB 3C  ..G0E. ....gSG.<
00C0: 8A D4 2F D2 76 D9 F8 C7   46 CE 9A 49 E7 FF B6 51  ../.v...F..I...Q
00D0: 25 8A 3F C5 9D 42 C6 02   21 00 E2 55 50 66 25 35  %.?..B..!..UPf%5
00E0: C5 CE B2 6B C1 A5 2B AB   71 D9 C3 EA E9 85 BA 27  ...k..+.q......'
00F0: 5A 9C 41 C7 13 55 15 D7   BE 7E 00 76 00 41 C8 CA  Z.A..U.....v.A..
0100: B1 DF 22 46 4A 10 C6 A1   3A 09 42 87 5E 4E 31 8B  .."FJ...:.B.^N1.
0110: 1B 03 EB EB 4B C7 68 F0   90 62 96 06 F6 00 00 01  ....K.h..b......
0120: 7A 98 F2 5C 76 00 00 04   03 00 47 30 45 02 20 07  z..\v.....G0E. .
0130: 62 59 7B 8D FA 25 FD B7   17 D7 B5 29 7A 24 EE 21  bY...%.....)z$.!
0140: 7F 97 65 D2 40 8B B0 95   17 F2 39 77 B8 22 B5 02  [email protected]."..
0150: 21 00 A1 B2 C7 90 67 2C   E9 BD C8 44 12 75 42 79  !.....g,...D.uBy
0160: AA 1A 01 BA 39 97 9F 92   F1 B8 F7 66 20 77 1B 7B  ....9......f w..
0170: CE F0                                              ..


[2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: ocsp
   accessLocation: URIName: http://ocsp.sca1b.amazontrust.com
, 
   accessMethod: caIssuers
   accessLocation: URIName: http://crt.sca1b.amazontrust.com/sca1b.crt
]
]

[3]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 59 A4 66 06 52 A0 7B 95   92 3C A3 94 07 27 96 74  Y.f.R....<...'.t
0010: 5B F9 3D D0                                        [.=.
]
]

[4]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:false
  PathLen: undefined
]

[5]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://crl.sca1b.amazontrust.com/sca1b.crl]
]]

[6]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.23.140.1.2.1]
[]  ]
]

[7]: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  serverAuth
  clientAuth
]

[8]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
]

[9]: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: plugnotas.com.br
  DNSName: *.plugnotas.com.br
]

[10]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 83 A0 E2 75 5E D0 C7 AC   46 87 3C 62 75 A7 52 AE  ...u^...F.<bu.R.
0010: 9E 2B 49 C7                                        .+I.
]
]

]
  Algorithm: [SHA256withRSA]
  Signature:
0000: 61 B4 E0 FC 2E 79 ED 34   87 26 B5 FE BF 3A 41 C3  a....y.4.&...:A.
0010: 84 8C 51 48 80 6F 9D B8   17 C8 2B F3 B9 DF 3E D1  ..QH.o....+...>.
0020: 53 69 A4 45 F0 15 79 36   62 08 75 CF EB C0 49 E7  Si.E..y6b.u...I.
0030: 5A 33 2B 77 8E 87 D3 36   F3 E4 6C DC D1 D8 DB 87  Z3+w...6..l.....
0040: 01 B4 9A C1 6B 78 12 1F   07 38 E0 4D 9E 42 DF 43  ....kx...8.M.B.C
0050: A5 21 D9 15 A1 80 E0 8E   47 FF 1D 6F E1 1C 7A 9E  .!......G..o..z.
0060: 91 CF A2 4D DA E4 97 F9   A3 FD AD E6 3F C5 4D FD  ...M........?.M.
0070: B5 E7 73 93 34 7C F9 5D   EE 00 24 61 7B 82 57 3D  ..s.4..]..$a..W=
0080: BF 53 75 A7 86 A8 F0 41   CF AB 1A 51 7F 6C 23 25  .Su....A...Q.l#%
0090: 0A 54 0D 53 5B C6 5C DC   73 0D CE C1 DF BC AD 8F  .T.S[.\.s.......
00A0: 8C 07 A2 D6 03 1B B0 90   88 CC 0D AA DA 2D AF EE  .............-..
00B0: 4F C4 32 11 B3 B8 DE 16   A5 CC D8 4F 64 8A FE FA  O.2........Od...
00C0: 77 DF 08 BD 4F 25 E0 2F   DE CC 38 BC 83 ED 8D D0  w...O%./..8.....
00D0: 4B 56 20 92 97 CF BB 5A   F6 55 6E 90 F7 A2 F2 E7  KV ....Z.Un.....
00E0: C3 C7 1C FF FD 35 46 4F   74 68 25 FD 74 1E FB F2  .....5FOth%.t...
00F0: E4 54 F3 CF 1D 61 3D B5   28 BD 36 49 3F 68 35 D5  .T...a=.(.6I?h5.

]
chain [1] = [
[
  Version: V3
  Subject: CN=Amazon, OU=Server CA 1B, O=Amazon, C=US
  Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11

  Key:  Sun RSA public key, 2048 bits
  params: null
  modulus: 24528737555851895213919827617064808536856788789868126310716752303420041319710819680867697306230985630039655096548324364189962675576756038921107965025585889330528490649228935527969954506874750514159926943451238689552458142167021149788529783891257271028002485075630471793111207960868638365698705018555597520367289025831586046483446904825820575805338475813865444295353094097022678376192149453480223428943386514159000527368947588174705227657134217583008630047462959260157651883088072156905420231950318110240318878613016990846576820326568049365612395397183597930457965295993595011597251067348997341253617591444999389873893
  public exponent: 65537
  Validity: [From: Wed Oct 21 22:00:00 BRST 2015,
               To: Sat Oct 18 21:00:00 BRT 2025]
  Issuer: CN=Amazon Root CA 1, O=Amazon, C=US
  SerialNumber: [    067f9457 8587e8ac 77deb253 325bbc99 8b560d]

Certificate Extensions: 7
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: ocsp
   accessLocation: URIName: http://ocsp.rootca1.amazontrust.com
, 
   accessMethod: caIssuers
   accessLocation: URIName: http://crt.rootca1.amazontrust.com/rootca1.cer
]
]

[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 84 18 CC 85 34 EC BC 0C   94 94 2E 08 59 9C C7 B2  ....4.......Y...
0010: 10 4E 0A 08                                        .N..
]
]

[3]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen:0
]

[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://crl.rootca1.amazontrust.com/rootca1.crl]
]]

[5]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.23.140.1.2.1]
[]  ]
]

[6]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_CertSign
  Crl_Sign
]

[7]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 59 A4 66 06 52 A0 7B 95   92 3C A3 94 07 27 96 74  Y.f.R....<...'.t
0010: 5B F9 3D D0                                        [.=.
]
]

]
  Algorithm: [SHA256withRSA]
  Signature:
0000: 85 92 BE 35 BB 79 CF A3   81 42 1C E4 E3 63 73 53  ...5.y...B...csS
0010: 39 52 35 E7 D1 AD FD AE   99 8A AC 89 12 2F BB E7  9R5........../..
0020: 6F 9A D5 4E 72 EA 20 30   61 F9 97 B2 CD A5 27 02  o..Nr. 0a.....'.
0030: 45 A8 CA 76 3E 98 4A 83   9E B6 E6 45 E0 F2 43 F6  E..v>.J....E..C.
0040: 08 DE 6D E8 6E DB 31 07   13 F0 2F 31 0D 93 6D 61  ..m.n.1.../1..ma
0050: 37 7B 58 F0 FC 51 98 91   28 02 4F 05 76 B7 D3 F0  7.X..Q..(.O.v...
0060: 1B C2 E6 5E D0 66 85 11   0F 2E 81 C6 10 81 29 FE  ...^.f........).
0070: 20 60 48 F3 F2 F0 84 13   53 65 35 15 11 6B 82 51   `H.....Se5..k.Q
0080: 40 55 57 5F 18 B5 B0 22   3E AD F2 5E A3 01 E3 C3  @UW_...">..^....
0090: B3 F9 CB 41 5A E6 52 91   BB E4 36 87 4F 2D A9 A4  ...AZ.R...6.O-..
00A0: 07 68 35 BA 94 72 CD 0E   EA 0E 7D 57 F2 79 FC 37  .h5..r.....W.y.7
00B0: C5 7B 60 9E B2 EB C0 2D   90 77 0D 49 10 27 A5 38  ..`....-.w.I.'.8
00C0: AD C4 12 A3 B4 A3 C8 48   B3 15 0B 1E E2 E2 19 DC  .......H........
00D0: C4 76 52 C8 BC 8A 41 78   70 D9 6D 97 B3 4A 8B 78  .vR...Axp.m..J.x
00E0: 2D 5E B4 0F A3 4C 60 CA   E1 47 CB 78 2D 12 17 B1  -^...L`..G.x-...
00F0: 52 8B CA 39 2C BD B5 2F   C2 33 02 96 AB DA 94 7F  R..9,../.3......

]
chain [2] = [
[
  Version: V3
  Subject: CN=Amazon Root CA 1, O=Amazon, C=US
  Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11

  Key:  Sun RSA public key, 2048 bits
  params: null
  modulus: 22529839904807742196558773392430766620630713202204326167346456925862066285712069978308045976033918808540171076811098215136401323342247576789054764683787147408289170989302937775178809187827657352584557953877946352196797789035355954596527030584944622221752357105572088106020206921431118198373122638305846252087992561841631797199384157902018140720267433956687491591657652730221337591680012205319549572614035105482287002884850178224609018864719685310905426619874727796905080238179726224664042154200651710137931048812546957419686875805576245376866031854569863410951649630469236463991472642618512857920826701027482532358669
  public exponent: 65537
  Validity: [From: Mon May 25 09:00:00 BRT 2015,
               To: Wed Dec 30 22:00:00 BRT 2037]
  Issuer: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US
  SerialNumber: [    067f944a 2a27cdf3 fac2ae2b 01f908ee b9c4c6]

Certificate Extensions: 7
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: ocsp
   accessLocation: URIName: http://ocsp.rootg2.amazontrust.com
, 
   accessMethod: caIssuers
   accessLocation: URIName: http://crt.rootg2.amazontrust.com/rootg2.cer
]
]

[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 9C 5F 00 DF AA 01 D7 30   2B 38 88 A2 B8 6D 4A 9C  ._.....0+8...mJ.
0010: F2 11 91 83                                        ....
]
]

[3]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://crl.rootg2.amazontrust.com/rootg2.crl]
]]

[5]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.5.29.32.0]
[]  ]
]

[6]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_CertSign
  Crl_Sign
]

[7]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 84 18 CC 85 34 EC BC 0C   94 94 2E 08 59 9C C7 B2  ....4.......Y...
0010: 10 4E 0A 08                                        .N..
]
]

]
  Algorithm: [SHA256withRSA]
  Signature:
0000: 62 37 42 5C BC 10 B5 3E   8B 2C E9 0C 9B 6C 45 E2  b7B\...>.,...lE.
0010: 07 00 7A F9 C5 58 0B B9   08 8C 3E ED B3 25 3C B5  ..z..X....>..%<.
0020: 6F 50 E4 CD 35 6A A7 93   34 96 32 21 A9 48 44 AB  oP..5j..4.2!.HD.
0030: 9C ED 3D B4 AA 73 6D E4   7F 16 80 89 6C CF 28 03  ..=..sm.....l.(.
0040: 18 83 47 79 A3 10 7E 30   5B AC 3B B0 60 E0 77 D4  ..Gy...0[.;.`.w.
0050: 08 A6 E1 1D 7C 5E C0 BB   F9 9A 7B 22 9D A7 00 09  .....^....."....
0060: 7E AC 46 17 83 DC 9C 26   57 99 30 39 62 96 8F ED  ..F....&W.09b...
0070: DA DE AA C5 CC 1B 3E CA   43 68 6C 57 16 BC D5 0E  ......>.ChlW....
0080: 20 2E FE FF C2 6A 5D 2E   A0 4A 6D 14 58 87 94 E6   ....j]..Jm.X...
0090: 39 31 5F 7C 73 CB 90 88   6A 84 11 96 27 A6 ED D9  91_.s...j...'...
00A0: 81 46 A6 7E A3 72 00 0A   52 3E 83 88 07 63 77 89  .F...r..R>...cw.
00B0: 69 17 0F 39 85 D2 AB 08   45 4D D0 51 3A FD 5D 5D  i..9....EM.Q:.]]
00C0: 37 64 4C 7E 30 B2 55 24   42 9D 36 B0 5D 9C 17 81  7dL.0.U$B.6.]...
00D0: 61 F1 CA F9 10 02 24 AB   EB 0D 74 91 8D 7B 45 29  a.....$...t...E)
00E0: 50 39 88 B2 A6 89 35 25   1E 14 6A 47 23 31 2F 5C  P9....5%..jG#1/\
00F0: 9A FA AD 9A 0E 62 51 A4   2A A9 C4 F9 34 9D 21 18  .....bQ.*...4.!.

]
chain [3] = [
[
  Version: V3
  Subject: CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US
  Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11

  Key:  Sun RSA public key, 2048 bits
  params: null
  modulus: 26894789576491863019171445242018370132029525033879210664513024255165308689836081694724912552986436241602345929261854187816625921774943728567119070351838976265193901442169339571326613928339955106648223197498035701437846440970934704192382084561469274550003268570741310868032789070264835003681318445644941362885752628282968349509706358865971392279088395067847314610178969555804359319567178098112935181143559364150874524817692694181296058297355335204675211145990489303168553611700020424738364579606192390834705213026692659672388567853246354560726855054573503174641583891075106464210711468427779853334564691648681991700229
  public exponent: 65537
  Validity: [From: Tue Sep 01 21:00:00 BRT 2009,
               To: Wed Jun 28 14:39:16 BRT 2034]
  Issuer: OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US
  SerialNumber: [    a70e4a4c 3482b77f]

Certificate Extensions: 7
[1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
   accessMethod: ocsp
   accessLocation: URIName: http://o.ss2.us/
, 
   accessMethod: caIssuers
   accessLocation: URIName: http://x.ss2.us/x.cer
]
]

[2]: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: BF 5F B7 D1 CE DD 1F 86   F4 5B 55 AC DC D7 10 C2  ._.......[U.....
0010: 0E A9 88 E7                                        ....
]
]

[3]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

[4]: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
  [DistributionPoint:
     [URIName: http://s.ss2.us/r.crl]
]]

[5]: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [2.5.29.32.0]
[]  ]
]

[6]: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_CertSign
  Crl_Sign
]

[7]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 9C 5F 00 DF AA 01 D7 30   2B 38 88 A2 B8 6D 4A 9C  ._.....0+8...mJ.
0010: F2 11 91 83                                        ....
]
]

]
  Algorithm: [SHA256withRSA]
  Signature:
0000: 23 1D E3 8A 57 CA 7D E9   17 79 4C F1 1E 55 FD CC  #...W....yL..U..
0010: 53 6E 3E 47 0F DF C6 55   F2 B2 04 36 ED 80 1F 53  Sn>G...U...6...S
0020: C4 5D 34 28 6B BE C7 55   FC 67 EA CB 3F 7F 90 B2  .]4(k..U.g..?...
0030: 33 CD 1B 58 10 82 02 F8   F8 2F F5 13 60 D4 05 CE  3..X...../..`...
0040: F1 81 08 C1 DD A7 75 97   4F 18 B9 6D DE F7 93 91  ......u.O..m....
0050: 08 BA 7E 40 2C ED C1 EA   BB 76 9E 33 06 77 1D 0D  ...@,....v.3.w..
0060: 08 7F 53 DD 1B 64 AB 82   27 F1 69 D5 4D 5E AE F4  ..S..d..'.i.M^..
0070: A1 C3 75 A7 58 44 2D F2   3C 70 98 AC BA 69 B6 95  ..u.XD-.<p...i..
0080: 77 7F 0F 31 5E 2C FC A0   87 3A 47 69 F0 79 5F F4  w..1^,...:Gi.y_.
0090: 14 54 A4 95 5E 11 78 12   60 27 CE 9F C2 77 FF 23  .T..^.x.`'...w.#
00A0: 53 77 5D BA FF EA 59 E7   DB CF AF 92 96 EF 24 9A  Sw]...Y.......$.
00B0: 35 10 7A 9C 91 C6 0E 7D   99 F6 3F 19 DF F5 72 54  5.z.......?...rT
00C0: E1 15 A9 07 59 7B 83 BF   52 2E 46 8C B2 00 64 76  ....Y...R.F...dv
00D0: 1C 48 D3 D8 79 E8 6E 56   CC AE 2C 03 90 D7 19 38  .H..y.nV..,....8
00E0: 99 E4 CA 09 19 5B FF 07   96 B0 A8 7F 34 49 DF 56  .....[......4I.V
00F0: A9 F7 B0 5F ED 33 ED 8C   47 B7 30 03 5D F4 03 8C  ..._.3..G.0.]...

]
***
%% Invalidated:  [Session-97933, SSL_NULL_WITH_NULL_NULL]
%% Invalidated:  [Session-97934, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256]
pool-852-thread-1, SEND TLSv1.2 ALERT:  fatal, description = certificate_unknown
pool-852-thread-1, WRITE: TLSv1.2 Alert, length = 2
pool-852-thread-1, called closeSocket()
pool-852-thread-1, handling exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
pool-852-thread-1, called close()
pool-852-thread-1, called closeInternal(true)
pool-852-thread-1, called close()
pool-852-thread-1, called closeInternal(true)
pool-852-thread-1, called close()
pool-852-thread-1, called closeInternal(true)

All needed certificates are alredy in cacert and we have no idea what else can we do to solve this problem.

Any help will be very appreciated

3
  • Is that the log of the server or the client? If the log is from the server the error certificate_unknown would be unusual, unless you were using HTTPS with client certificate authentication. Commented May 21, 2022 at 12:52
  • This is happening in the client application. Commented May 23, 2022 at 14:31
  • I solved the problem. There is two versions of http-client in my project, one of them was altering the configuration of cacerts used for the application in runtime. Commented Jun 28, 2022 at 16:42

0

Your Answer

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.