Hello there,
I am trying to configure a
Spring Boot (backend) + ZK (frontend) application with ZK. I am following the tutorials but I am not sure why is not working: After entering into my app, I get redirected to the login page of
my CAS overlay, but when I introduce my credentials in there and I get redirected into my application, the application sends redirect to CAS as if I was not authenticated. After that, CAS sends me back to the app and so on, which makes me enter into an infinite loops of redirects.
I have seen also an error in the logs "unable to find valid certiciation path to requested target", which is a SSL error. Even if I put the CAS server certificate in the truststore of my app, the error keeps appearing. My app does use HTTP and CAS uses HTTPS...
Anyway, I think that the SSL error is related to the infinite redirection loop, but it is not the main cause of it. I think there is something wrong with my security configuration.
I will post first the CAS beans:
@Component
public class CasSecuredApplication {
@Autowired
UserDetailsServiceImpl userDetailsService;
// login
@Bean
public AuthenticationManager authenticationManager(CasAuthenticationProvider casAuthenticationProvider) {
return new ProviderManager(Arrays.asList(casAuthenticationProvider));
}
@Bean
public CasAuthenticationFilter casAuthenticationFilter(
ServiceProperties serviceProperties, AuthenticationManager authenticationManager) throws Exception {
CasAuthenticationFilter filter = new CasAuthenticationFilter();
filter.setAuthenticationManager(authenticationManager);
filter.setServiceProperties(serviceProperties);
return filter;
}
@Bean
public ServiceProperties serviceProperties() {
ServiceProperties serviceProperties = new ServiceProperties();
serviceProperties.setService("http://echempad.iciq.es:8081/login/cas");
serviceProperties.setSendRenew(false);
//serviceProperties.setArtifactParameter(DEFAULT_CAS_ARTIFACT_PARAMETER);
return serviceProperties;
}
@Bean
public TicketValidator ticketValidator() {
return new Cas30ServiceTicketValidator("https://echempad-cas.iciq.es:8443/cas");
}
@Bean
public CasAuthenticationProvider casAuthenticationProvider(
TicketValidator ticketValidator,
ServiceProperties serviceProperties) {
CasAuthenticationProvider provider = new CasAuthenticationProvider();
provider.setServiceProperties(serviceProperties);
provider.setTicketValidator(ticketValidator);
// Static login
//provider.setUserDetailsService(s -> new User("casuser", "Mellon", true, true, true, true, AuthorityUtils.createAuthorityList("ROLE_ADMIN")));
provider.setUserDetailsService(this.userDetailsService);
provider.setKey("CAS_PROVIDER_LOCALHOST_8081");
return provider;
}
@Bean
@Primary
public AuthenticationEntryPoint casAuthenticationEntryPoint(ServiceProperties serviceProperties)
{
CasAuthenticationEntryPoint casAuthenticationEntryPoint = new CasAuthenticationEntryPoint();
casAuthenticationEntryPoint.setServiceProperties(serviceProperties);
// TODO: this url needs to be parametrized for developer / production mode
casAuthenticationEntryPoint.setLoginUrl("https://echempad-cas.iciq.es:8443/cas/login");
return casAuthenticationEntryPoint;
}
@Bean
public AuthenticationUserDetailsService<Authentication> authenticationUserDetailsService() {
UserDetailsByNameServiceWrapper<Authentication> serviceWrapper = new UserDetailsByNameServiceWrapper<>();
serviceWrapper.setUserDetailsService(this.userDetailsService);
return serviceWrapper;
}
// logout
@Bean
public SecurityContextLogoutHandler securityContextLogoutHandler() {
return new SecurityContextLogoutHandler();
}
@Bean
@Autowired
public LogoutFilter logoutFilter(SecurityContextLogoutHandler securityContextLogoutHandler) {
LogoutFilter logoutFilter = new LogoutFilter(
"https://echempad-cas.iciq.es:8443/cas/logout",
securityContextLogoutHandler);
logoutFilter.setFilterProcessesUrl("/logout/cas");
return logoutFilter;
}
@Bean
public SingleSignOutFilter singleSignOutFilter() {
SingleSignOutFilter singleSignOutFilter = new SingleSignOutFilter();
singleSignOutFilter.setLogoutCallbackPath("https://echempad-cas.iciq.es:8443/cas");
singleSignOutFilter.setIgnoreInitConfiguration(true);
return singleSignOutFilter;
} }
And the security config:
@EnableWebSecurity
@Configuration
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
/**
* Sets the state of the CSRF protection
*/
@Value("${eChempad.security.csrf}")
private boolean csrfDisabled;
/**
* Sets the state of the CORS protection
*/
@Value("${eChempad.security.csrf}")
private boolean corsDisabled;
/**
* To provide the {@code UserDetailsService} for authentication purposes.
*/
@Autowired
private UserDetailsService userDetailsService;
/**
* To integrate CAS with its entrypoint (service login url)
*/
@Autowired
private AuthenticationEntryPoint authenticationEntryPoint;
/**
* For CAS integration
*/
@Autowired
private AuthenticationProvider authenticationProvider;
/**
* For CAS authentication
*/
@Autowired
private CasAuthenticationFilter casAuthenticationFilter;
/**
* Allow everyone to access the login and logout form and allow everyone to access the login API calls.
* Allow only authenticated users to access the API.
*
* @see <a href="https://www.zkoss.org/wiki/ZK%20Developer's%20Reference/Security%20Tips/Cross-site%20Request%20Forgery">...</a>
* @see <a href="https://stackoverflow.com/questions/2952196/ant-path-style-patterns">...</a>
* @see <a href="https://stackoverflow.com/questions/57574981/what-is-httpbasic-method-in-spring-security">...</a>
* @see <a href="https://javabydeveloper.com/refused-to-display-in-a-frame-because-it-set-x-frame-options-to-deny-in-spring/">...</a>
* @param http HTTP security class. Can be used to configure a lot of different parameters regarding HTTP security.
* @throws Exception Any type of exception that occurs during the HTTP configuration
*/
@Override
protected void configure(@NotNull HttpSecurity http) throws Exception {
// ZUL files regexp execution time
String zulFiles = "/zkau/web/**/*.zul";
// Web files regexp execution time
String[] zkResources = {"/zkau/web/**/js/**", "/zkau/web/**/zul/css/**", "/zkau/web/**/img/**"};
// Allow desktop cleanup after logout or when reloading login page
String removeDesktopRegex = "/zkau\\?dtid=.*&cmd_0=rmDesktop&.*";
// Anonymous accessible pages
String[] anonymousPages = new String[]{"/login","/logout", "/timeout", "/help", "/exit"};
// Pages that need authentication: CRUD API & ZK page
String[] authenticatedPages = new String[]{"/api/**", "/profile", "/"};
// you need to disable spring CSRF to make ZK AU pass security filter
// ZK already sends a AJAX request with a built-in CSRF token,
http.csrf().disable();
// Conditional activation depending on profile
if (! this.corsDisabled) {
http.cors().disable();
}
http
.addFilter(this.casAuthenticationFilter)
// allows the basic HTTP authentication. If the user cannot be authenticated using HTTP auth headers it
// will show a 401 unauthenticated*/
.httpBasic()
.authenticationEntryPoint(this.authenticationEntryPoint)
.and()
.logout()
.logoutRequestMatcher(new AntPathRequestMatcher("/logout"))
.and()
.headers()
.frameOptions()
.sameOrigin() // X-Frame-Options = SAMEORIGIN
// API endpoints protection
.and()
.authorizeRequests()
.antMatchers("/api/authority").authenticated()
.antMatchers("/api/researcher").authenticated()
.antMatchers("/api/journal").authenticated()
.antMatchers("/api/experiment").authenticated()
.antMatchers("/api/document").authenticated()
.antMatchers("/api/**").authenticated()
// For the GUI with ZKoss
.and()
.authorizeRequests()
.antMatchers(zulFiles).denyAll() // Block direct access to zul files
.antMatchers(HttpMethod.GET, zkResources).permitAll() // Allow ZK resources
.regexMatchers(HttpMethod.GET, removeDesktopRegex).permitAll() // Allow desktop cleanup
// Allow desktop cleanup from ZATS
.requestMatchers(req -> "rmDesktop".equals(req.getParameter("cmd_0"))).permitAll()
// Allow unauthenticated access to log in, log out, exit, help, report bug...
.mvcMatchers(anonymousPages).permitAll()
// Only allow authenticated users in the ZK main page and in the API endpoints
.mvcMatchers(authenticatedPages).hasRole("USER")
// Creates the http form login in the default URL /login· The first parameter is a string corresponding
// to the URL where we will map the login form
/*.and()
.formLogin()
.loginPage("/login")
.defaultSuccessUrl("/") // Successful redirect URL after login is root page
// Creates a logout form
.and()
.logout()
.logoutUrl("/logout")
.logoutSuccessUrl("/login") // After logout, redirect to login page
*/
// Any other requests have to be authenticated too
.and()
.authorizeRequests()
.anyRequest()
.authenticated();
}
/**
* Configures the authentication. Currently, it is done simply by providing a {@code UserDetailsService}, which
* uses the database to get user information username and password
* WARNING! This method is executed before the initialization method in ApplicationStartup, so if the database is
* not already initialized with the users that we want to authorize we will not be able to input requests from any
* users, even if they have been loaded afterwards.
*
* @see <a href="https://www.arteco-consulting.com/securizando-una-aplicacion-con-spring-boot/">...</a>
* @param authenticationBuilder Object instance used to build authentication objects.
* @throws Exception Any type of exception
*/
@Autowired
@Transactional
public void configureGlobal(AuthenticationManagerBuilder authenticationBuilder) throws Exception
{
authenticationBuilder
// Provide the service to retrieve user details
.userDetailsService(this.userDetailsService)
// Provide the password encoder used to store password in the database
.passwordEncoder(WebSecurityConfig.passwordEncoder())
.and()
// CAS authentication provider
.authenticationProvider(this.authenticationProvider);
}
@Override
protected AuthenticationManager authenticationManager() throws Exception {
return new ProviderManager(Arrays.asList(authenticationProvider));
}
/**
* Bean that returns the password encoder used for hashing passwords.
*
* @return Returns an instance of encode, which can be used by accessing to encode(String) method
*/
@Bean()
public static PasswordEncoder passwordEncoder()
{
return NoOpPasswordEncoder.getInstance(); // TODO: In production change to a safe password encoder
//return new BCryptPasswordEncoder();
}
@Bean
public static CorsConfigurationSource corsConfigurationSource() {
CorsConfiguration configuration = new CorsConfiguration();
configuration.setAllowedOrigins(Collections.singletonList("*"));
configuration.setAllowedMethods(Collections.singletonList("*"));
configuration.setAllowedHeaders(Collections.singletonList("*"));
configuration.setAllowCredentials(true);
UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
source.registerCorsConfiguration("/**", configuration);
return source;
}
Also, this is the service definition in my custom overlay of CAS:
The relevant .properties file of CAS:
## Login and users
# Static login
spring.security.user.name=casuser
spring.security.user.password=secret
## DB config
cas.authn.jdbc.query[0].url=jdbc:postgresql://localhost:5432/eChempad
## Server
# A CAS host is automatically appended to the ticket ids generated by CAS. If none is specified, one is automatically detected and used by CAS.
cas.server.name=https://echempad-cas.iciq.es:8443
cas.server.prefix=https://echempad-cas.iciq.es:8443/cas
## Encryption and keys
# Encryption key of size 512 for Ticket-granting Cookie
cas.tgc.crypto.encryption.key=pTT0PccV7ViNTZYwVgxv_cBOlceDZkGEjgLZtQg74Y4
# Signing key of size 512 for Ticket-granting Cookie
cas.tgc.crypto.signing.key=K5iBLkY4IM-eaheqZfBRnDk4oMcTGhann-tgUQIVG6I7SoXy2sPnXOM6KGZL9SxGeZabvR02Daqmue3SYDqiSQ
# Signing key of size 512 for webflow
cas.webflow.crypto.signing.key=BGCenNkCGJcpAoAMF8xNEPLX5H8BXP6cssc1gDXxGvXOwef8LSZgs5AuR4vm-LNzv9bzMH71ll-25HmqmMB9Ag
# Secret key for encryption of size 16
cas.webflow.crypto.encryption.key=72EBixy4wLsBocfLIr6gbw
## Logging
# prod logger is the default logger
logging.config=file:/etc/cas/config/log4j2-dev.xml
logging.level.org.springframework=DEBUG
Also, here is the part of the log where the infinite redirect loop starts. As you can see, tickets are produced non-stop and if I leave the infinite loop running I can end up with hundreds of tickets in the CAS server:
2023-10-26 10:35:27.595 INFO 36220 --- [ main] o.I.e.c.database.DatabaseInitStartup : END INITIALIZING DB
2023-10-26 10:35:27.595 DEBUG 36220 --- [ main] o.s.b.a.ApplicationAvailabilityBean : Application availability state ReadinessState changed to ACCEPTING_TRAFFIC
2023-10-26 10:35:48.115 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:35:48.115 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:35:50.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:35:50.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:16.054 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase : Start expire sessions StandardManager at 1698309376053 sessioncount 0
2023-10-26 10:36:16.054 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase : End expire sessions StandardManager processingTime 1 expired sessions: 0
2023-10-26 10:36:18.117 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:18.117 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:20.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:20.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:48.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:48.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:50.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:50.674 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:16.058 DEBUG 36220 --- [alina-utility-1] org.apache.catalina.session.ManagerBase : Start expire sessions StandardManager at 1698309436058 sessioncount 0
2023-10-26 10:37:16.058 DEBUG 36220 --- [alina-utility-1] org.apache.catalina.session.ManagerBase : End expire sessions StandardManager processingTime 0 expired sessions: 0
2023-10-26 10:37:18.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:18.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:20.674 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:20.674 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:48.119 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:48.119 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:50.675 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:50.675 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:16.065 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase : Start expire sessions StandardManager at 1698309496065 sessioncount 0
2023-10-26 10:38:16.065 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase : End expire sessions StandardManager processingTime 0 expired sessions: 0
2023-10-26 10:38:18.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:18.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:20.675 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:20.676 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:23.291 DEBUG 36220 --- [o-8081-Acceptor] o.apache.tomcat.util.threads.LimitLatch : Counting up[http-nio-8081-Acceptor] latch=1
2023-10-26 10:38:23.323 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [0]
2023-10-26 10:38:23.324 DEBUG 36220 --- [nio-8081-exec-1] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read from buffer: [0]
2023-10-26 10:38:23.325 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read direct from socket: [707]
2023-10-26 10:38:23.325 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer : Received [GET / HTTP/1.1
Host: localhost:8081
Connection: keep-alive
sec-ch-ua: "Google Chrome";v="113", "Chromium";v="113", "Not-A.Brand";v="24"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Linux"
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=A89D3862AFC825E210BF7A7F25EC9513
]
2023-10-26 10:38:23.340 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.http.Parameters : Set query string encoding to UTF-8
2023-10-26 10:38:23.341 DEBUG 36220 --- [nio-8081-exec-1] o.a.t.util.http.Rfc6265CookieProcessor : Cookies: Parsing b[]: JSESSIONID=A89D3862AFC825E210BF7A7F25EC9513
2023-10-26 10:38:23.350 DEBUG 36220 --- [nio-8081-exec-1] o.a.catalina.connector.CoyoteAdapter : Requested cookie session id is A89D3862AFC825E210BF7A7F25EC9513
2023-10-26 10:38:23.354 DEBUG 36220 --- [nio-8081-exec-1] o.a.c.authenticator.AuthenticatorBase : Security checking request GET /
2023-10-26 10:38:23.354 DEBUG 36220 --- [nio-8081-exec-1] org.apache.catalina.realm.RealmBase : No applicable constraints defined
2023-10-26 10:38:23.364 DEBUG 36220 --- [nio-8081-exec-1] o.a.c.a.jaspic.AuthConfigFactoryImpl : Loading persistent provider registrations from [/tmp/tomcat.8081.17214353618447723602/conf/jaspic-providers.xml]
2023-10-26 10:38:23.364 DEBUG 36220 --- [nio-8081-exec-1] o.a.c.authenticator.AuthenticatorBase : Not subject to any constraint
2023-10-26 10:38:23.366 INFO 36220 --- [nio-8081-exec-1] o.a.c.c.C.[Tomcat].[localhost].[/] : Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-10-26 10:38:23.366 INFO 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : Initializing Servlet 'dispatcherServlet'
2023-10-26 10:38:23.366 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : Detected StandardServletMultipartResolver
2023-10-26 10:38:23.366 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : Detected AcceptHeaderLocaleResolver
2023-10-26 10:38:23.366 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : Detected FixedThemeResolver
2023-10-26 10:38:23.367 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : Detected org.springframework.web.servlet.view.DefaultRequestToViewNameTranslator@636b542c
2023-10-26 10:38:23.368 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : Detected org.springframework.web.servlet.support.SessionFlashMapManager@6445360b
2023-10-26 10:38:23.368 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : enableLoggingRequestDetails='true': request parameters and headers will be shown which may lead to unsafe logging of potentially sensitive data
2023-10-26 10:38:23.368 INFO 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet : Completed initialization in 2 ms
2023-10-26 10:38:23.377 DEBUG 36220 --- [nio-8081-exec-1] o.s.security.web.FilterChainProxy : Securing GET /
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorConfigured = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorRequest = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter : proxyTicketRequest = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter : requiresAuthentication = false
2023-10-26 10:38:23.382 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.a.AnonymousAuthenticationFilter : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:23.382 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.session.SessionManagementFilter : Request requested invalid session id A89D3862AFC825E210BF7A7F25EC9513
2023-10-26 10:38:23.382 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.u.matcher.RegexRequestMatcher : Checking match of request : '/'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:23.383 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.http.Parameters : Set encoding to UTF-8
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.386 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.386 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.391 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.a.i.FilterSecurityInterceptor : Failed to authorize filter invocation [GET /] with attributes [hasRole('ROLE_USER')]
2023-10-26 10:38:23.401 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.s.HttpSessionRequestCache : Saved request http://localhost:8081/ to session
2023-10-26 10:38:23.402 DEBUG 36220 --- [nio-8081-exec-1] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:23.403 DEBUG 36220 --- [nio-8081-exec-1] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:23.403 DEBUG 36220 --- [nio-8081-exec-1] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:23.405 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [707]
2023-10-26 10:38:23.405 DEBUG 36220 --- [nio-8081-exec-1] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read from buffer: [0]
2023-10-26 10:38:23.405 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read direct from socket: [0]
2023-10-26 10:38:23.406 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer : Received []
2023-10-26 10:38:23.406 DEBUG 36220 --- [nio-8081-exec-1] o.apache.coyote.http11.Http11Processor : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Status in: [OPEN_READ], State out: [OPEN]
2023-10-26 10:38:23.406 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.net.NioEndpoint : Registered read interest for [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]]
2023-10-26 10:38:48.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:48.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:48.818 DEBUG 36220 --- [o-8081-Acceptor] o.apache.tomcat.util.threads.LimitLatch : Counting up[http-nio-8081-Acceptor] latch=2
2023-10-26 10:38:48.820 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [707]
2023-10-26 10:38:48.820 DEBUG 36220 --- [nio-8081-exec-2] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:48.821 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:48.821 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer : Received [GET /login/cas?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=BADADABCF18C386D3E3EE2769FC1D53A
]
2023-10-26 10:38:48.823 DEBUG 36220 --- [nio-8081-exec-2] o.a.t.util.http.Rfc6265CookieProcessor : Cookies: Parsing b[]: JSESSIONID=BADADABCF18C386D3E3EE2769FC1D53A
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.a.catalina.connector.CoyoteAdapter : Requested cookie session id is BADADABCF18C386D3E3EE2769FC1D53A
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase : Security checking request GET /login/cas
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] org.apache.catalina.realm.RealmBase : No applicable constraints defined
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase : Not subject to any constraint
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy : Securing GET /login/cas?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = true
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : requiresAuthentication = true
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorConfigured = false
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorRequest = false
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = true
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters : Set encoding to UTF-8
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters : Decoding query null UTF-8
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters : Start processing with input [ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox]
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.c.a.CasAuthenticationProvider : serviceUrl = http://echempad.iciq.es:8081/login/cas
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Placing URL parameters in map.
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Calling template URL attribute map.
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Loading custom parameters from configuration.
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Constructing validation url: https://echempad-cas.iciq.es:8443/cas/p3/serviceValidate?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox&service=http%3A%2F%2Fechempad.iciq.es%3A8081%2Flogin%2Fcas
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Retrieving response from server.
2023-10-26 10:38:48.831 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:2048, Cert Id:-1642094263, Valid from:8/28/08, 9:24 AM, Valid until:12/31/30, 4:59 PM
2023-10-26 10:38:48.832 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:62f6326ce5c4e3685c1b62dd9c2e9d95, Subject:CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS, OID.2.5.4.97=VATES-Q2826004J, OU=Ceres, O=FNMT-RCM, C=ES, Issuer:CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS, OID.2.5.4.97=VATES-Q2826004J, OU=Ceres, O=FNMT-RCM, C=ES, Key type:EC, Length:384, Cert Id:246315697, Valid from:12/20/18, 10:37 AM, Valid until:12/20/43, 10:37 AM
2023-10-26 10:38:48.832 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:2646197731e14f6f2836de395186e6d4978822c1, Subject:CN=E-Tugra Global Root CA ECC v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Issuer:CN=E-Tugra Global Root CA ECC v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Key type:EC, Length:384, Cert Id:96274892, Valid from:3/18/20, 10:46 AM, Valid until:3/12/45, 10:46 AM
2023-10-26 10:38:48.833 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:7497258ac73f7a54, Subject:CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US, Key type:EC, Length:384, Cert Id:-2080363786, Valid from:1/29/10, 3:20 PM, Valid until:12/31/40, 3:20 PM
2023-10-26 10:38:48.834 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:dd3e3bc6cf96bb1, Subject:CN=ANF Secure Server Root CA, OU=ANF CA Raiz, O=ANF Autoridad de Certificacion, C=ES, SERIALNUMBER=G63287510, Issuer:CN=ANF Secure Server Root CA, OU=ANF CA Raiz, O=ANF Autoridad de Certificacion, C=ES, SERIALNUMBER=G63287510, Key type:RSA, Length:4096, Cert Id:-841649695, Valid from:9/4/19, 12:00 PM, Valid until:8/30/39, 12:00 PM
2023-10-26 10:38:48.834 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:d4dc5cd16229596087eb80b7f150634fb791034, Subject:CN=E-Tugra Global Root CA RSA v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Issuer:CN=E-Tugra Global Root CA RSA v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Key type:RSA, Length:4096, Cert Id:1381684375, Valid from:3/18/20, 10:07 AM, Valid until:3/12/45, 10:07 AM
2023-10-26 10:38:48.835 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:55556bcf25ea43535c3a40fd5ab4572, Subject:CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:EC, Length:384, Cert Id:-795968543, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:48.835 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:5c8b99c55a94c5d27156decd8980cc26, Subject:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:EC, Length:384, Cert Id:-965679910, Valid from:2/1/10, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:48.836 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:a0142800000014523c844b500000002, Subject:CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US, Issuer:CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US, Key type:RSA, Length:4096, Cert Id:1232565210, Valid from:1/16/14, 7:12 PM, Valid until:1/16/34, 7:12 PM
2023-10-26 10:38:48.836 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:cf08e5c0816a5ad427ff0eb271859d0, Subject:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Issuer:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:2034155325, Valid from:11/7/06, 8:31 PM, Valid until:12/31/29, 8:40 PM
2023-10-26 10:38:48.837 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:39ca931cef43f3c68e93c7f46489387e, Subject:CN=HARICA TLS RSA Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Issuer:CN=HARICA TLS RSA Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Key type:RSA, Length:4096, Cert Id:1709624614, Valid from:2/19/21, 11:55 AM, Valid until:2/13/45, 11:55 AM
2023-10-26 10:38:48.838 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:5ddfb1da5aa3ed5dbe5a6520650390ef, Subject:CN=UCA Global G2 Root, O=UniTrust, C=CN, Issuer:CN=UCA Global G2 Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:1844967193, Valid from:3/11/16, 1:00 AM, Valid until:12/31/40, 1:00 AM
2023-10-26 10:38:48.838 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Issuer:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Key type:RSA, Length:2048, Cert Id:2079057034, Valid from:4/8/09, 6:56 AM, Valid until:4/8/29, 6:56 AM
2023-10-26 10:38:48.838 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:41d29dd172eaeea780c12c6ce92f8752, Subject:CN=ISRG Root X2, O=Internet Security Research Group, C=US, Issuer:CN=ISRG Root X2, O=Internet Security Research Group, C=US, Key type:EC, Length:384, Cert Id:-896325052, Valid from:9/4/20, 2:00 AM, Valid until:9/17/40, 6:00 PM
2023-10-26 10:38:48.839 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:RSA, Length:2048, Cert Id:-1197580894, Valid from:1/1/04, 1:00 AM, Valid until:1/1/29, 12:59 AM
2023-10-26 10:38:48.839 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:66f23daf87de8bb14aea0c573101c2ec, Subject:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:EC, Length:384, Cert Id:-1054206011, Valid from:12/19/19, 12:06 AM, Valid until:7/19/42, 1:16 AM
2023-10-26 10:38:48.839 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:5d938d306736c8061d1ac754846907, Subject:OU=AC RAIZ FNMT-RCM, O=FNMT-RCM, C=ES, Issuer:OU=AC RAIZ FNMT-RCM, O=FNMT-RCM, C=ES, Key type:RSA, Length:4096, Cert Id:1555523573, Valid from:10/29/08, 4:59 PM, Valid until:1/1/30, 1:00 AM
2023-10-26 10:38:48.840 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:5f0241d77a877c4c03a3ac968dfbffd0, Subject:CN=D-TRUST EV Root CA 1 2020, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST EV Root CA 1 2020, O=D-Trust GmbH, C=DE, Key type:EC, Length:384, Cert Id:238735896, Valid from:2/11/20, 11:00 AM, Valid until:2/11/35, 10:59 AM
2023-10-26 10:38:48.840 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Hellenic Academic and Research Institutions RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Issuer:CN=Hellenic Academic and Research Institutions RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Key type:RSA, Length:4096, Cert Id:-802976731, Valid from:7/7/15, 12:11 PM, Valid until:6/30/40, 12:11 PM
2023-10-26 10:38:48.841 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:8f9b478a8fa7eda6a333789de7ccf8a, Subject:CN=DigiCert TLS RSA4096 Root G5, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert TLS RSA4096 Root G5, O="DigiCert, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:165956757, Valid from:1/15/21, 1:00 AM, Valid until:1/15/46, 12:59 AM
2023-10-26 10:38:48.841 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:4fd22b8ff564c8339e4f345866237060, Subject:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Issuer:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:649181271, Valid from:3/13/15, 1:00 AM, Valid until:12/31/38, 1:00 AM
2023-10-26 10:38:48.841 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:d9b5437fafa9390f000000005565ad58, Subject:CN=Entrust Root Certification Authority - G4, OU="(c) 2015 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority - G4, OU="(c) 2015 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:1368037548, Valid from:5/27/15, 1:11 PM, Valid until:12/27/37, 12:41 PM
2023-10-26 10:38:48.842 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:1ed397095fd8b4b347701eaabe7f45b3, Subject:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:RSA, Length:4096, Cert Id:-1446618248, Valid from:12/18/19, 11:51 PM, Valid until:7/19/42, 1:00 AM
2023-10-26 10:38:48.843 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:4e812d8a8265e00b02ee3e350246e53d, Subject:CN=COMODO Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=COMODO Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:RSA, Length:2048, Cert Id:904304908, Valid from:12/1/06, 1:00 AM, Valid until:1/1/30, 12:59 AM
2023-10-26 10:38:48.843 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:84822c5f1c62d040, Subject:CN=TrustCor ECA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Issuer:CN=TrustCor ECA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Key type:RSA, Length:2048, Cert Id:1382581529, Valid from:2/4/16, 1:32 PM, Valid until:12/31/29, 6:28 PM
2023-10-26 10:38:48.843 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:66c9fd29635869f0a0fe58678f85b26bb8a37, Subject:CN=Amazon Root CA 2, O=Amazon, C=US, Issuer:CN=Amazon Root CA 2, O=Amazon, C=US, Key type:RSA, Length:4096, Cert Id:-1766132388, Valid from:5/26/15, 2:00 AM, Valid until:5/26/40, 2:00 AM
2023-10-26 10:38:48.844 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:212a560caeda0cab4045bf2ba22d3aea, Subject:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:EC, Length:384, Cert Id:-1513165457, Valid from:5/9/17, 11:48 AM, Valid until:5/9/42, 11:58 AM
2023-10-26 10:38:48.844 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:4f1bd42f54bb2f4b, Subject:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:126726124, Valid from:10/25/06, 10:32 AM, Valid until:10/25/36, 10:32 AM
2023-10-26 10:38:48.844 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:66c9fd7c1bb104c2943e5717b7b2cc81ac10e, Subject:CN=Amazon Root CA 4, O=Amazon, C=US, Issuer:CN=Amazon Root CA 4, O=Amazon, C=US, Key type:EC, Length:384, Cert Id:-1654272513, Valid from:5/26/15, 2:00 AM, Valid until:5/26/40, 2:00 AM
2023-10-26 10:38:48.845 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:5c33cb622c5fb332, Subject:C=DE, O=Atos, CN=Atos TrustedRoot 2011, Issuer:C=DE, O=Atos, CN=Atos TrustedRoot 2011, Key type:RSA, Length:2048, Cert Id:-28528624, Valid from:7/7/11, 4:58 PM, Valid until:1/1/31, 12:59 AM
2023-10-26 10:38:48.845 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:7b2c9bd316803299, Subject:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:156725711, Valid from:2/12/16, 6:39 PM, Valid until:2/12/41, 6:39 PM
2023-10-26 10:38:48.846 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:1302d5e2404c92468616675db4bbbbb26b3efc13, Subject:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Issuer:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Key type:RSA, Length:4096, Cert Id:1973181427, Valid from:4/26/19, 10:57 AM, Valid until:4/26/44, 10:57 AM
2023-10-26 10:38:48.857 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withECDSA, Serial:2c299c5b16ed0595, Subject:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:1789254518, Valid from:2/12/16, 7:15 PM, Valid until:2/12/41, 7:15 PM
2023-10-26 10:38:48.858 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US, Issuer:OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:-271444299, Valid from:6/29/04, 7:06 PM, Valid until:6/29/34, 7:06 PM
2023-10-26 10:38:48.858 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:62533b1470333275cf98d9ab9bfccf8, Subject:CN=Certainly Root E1, O=Certainly, C=US, Issuer:CN=Certainly Root E1, O=Certainly, C=US, Key type:EC, Length:384, Cert Id:792571453, Valid from:4/1/21, 2:00 AM, Valid until:4/1/46, 2:00 AM
2023-10-26 10:38:48.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:-1026641587, Valid from:9/1/09, 2:00 AM, Valid until:1/1/38, 12:59 AM
2023-10-26 10:38:48.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:b0b75a16485fbfe1cbf58bd719e67d, Subject:CN=Izenpe.com, O=IZENPE S.A., C=ES, Issuer:CN=Izenpe.com, O=IZENPE S.A., C=ES, Key type:RSA, Length:4096, Cert Id:-1845580984, Valid from:12/13/07, 2:08 PM, Valid until:12/13/37, 9:27 AM
2023-10-26 10:38:48.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:605949e0262ebb55f90a778a71f94ad86c, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5, Key type:EC, Length:384, Cert Id:1997048439, Valid from:11/13/12, 1:00 AM, Valid until:1/19/38, 4:14 AM
2023-10-26 10:38:48.860 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withECDSA, Serial:203e57ef53f93fda50921b2a6, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4, Key type:EC, Length:256, Cert Id:-516970517, Valid from:11/13/12, 1:00 AM, Valid until:1/19/38, 4:14 AM
2023-10-26 10:38:48.860 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA512withRSA, Serial:1ebf5950b8c980374c06f7eb554fb5ed, Subject:CN=Certum Trusted Root CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Issuer:CN=Certum Trusted Root CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Key type:RSA, Length:4096, Cert Id:-774327051, Valid from:3/16/18, 1:10 PM, Valid until:3/16/43, 1:10 PM
2023-10-26 10:38:48.860 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:75622a4e8d48a894df413c8f0f8eaa5, Subject:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Issuer:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:-1476772975, Valid from:11/7/06, 8:42 PM, Valid until:12/31/29, 8:52 PM
2023-10-26 10:38:48.907 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:49412ce40010, Subject:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Issuer:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:58541246, Valid from:12/11/08, 4:08 PM, Valid until:12/6/28, 4:08 PM
2023-10-26 10:38:48.908 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:570a119742c4e3cc, Subject:CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT, Issuer:CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT, Key type:RSA, Length:4096, Cert Id:1729119956, Valid from:9/22/11, 1:22 PM, Valid until:9/22/30, 1:22 PM
2023-10-26 10:38:48.908 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:e17c3740fd1bfe67, Subject:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:4096, Cert Id:-490273538, Valid from:6/16/16, 8:17 AM, Valid until:1/18/38, 7:17 AM
2023-10-26 10:38:48.909 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:110034b64ec6362d36, Subject:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Issuer:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Key type:RSA, Length:4096, Cert Id:-2113880430, Valid from:2/6/17, 10:27 AM, Valid until:2/6/42, 10:27 AM
2023-10-26 10:38:48.909 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:3e8a5d07ec55d232d5b7e3b65f01eb2ddce4d6e4, Subject:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Issuer:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Key type:RSA, Length:2048, Cert Id:381279303, Valid from:10/19/15, 9:43 AM, Valid until:10/19/35, 9:43 AM
2023-10-26 10:38:48.910 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:8bd85976c9927a48068473b, Subject:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:384, Cert Id:-1993924923, Valid from:8/23/17, 9:36 PM, Valid until:8/23/42, 9:36 PM
2023-10-26 10:38:48.920 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:11d2bbb9d723189e405f0a9d2dd0df2567d1, Subject:CN=GlobalSign Root R46, O=GlobalSign nv-sa, C=BE, Issuer:CN=GlobalSign Root R46, O=GlobalSign nv-sa, C=BE, Key type:RSA, Length:4096, Cert Id:1275948927, Valid from:3/20/19, 1:00 AM, Valid until:3/20/46, 1:00 AM
2023-10-26 10:38:48.920 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:4a538c28, Subject:CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:1936920337, Valid from:7/7/09, 7:25 PM, Valid until:12/7/30, 6:55 PM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:184accd6, Subject:CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN, Issuer:CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN, Key type:RSA, Length:4096, Cert Id:551407782, Valid from:8/8/12, 5:07 AM, Valid until:12/31/29, 4:07 AM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:7b71b68256b8127c9ca8, Subject:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:EC, Length:384, Cert Id:-948456756, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP, Issuer:OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP, Key type:RSA, Length:2048, Cert Id:1802358121, Valid from:9/30/03, 6:20 AM, Valid until:9/30/23, 6:20 AM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:3cf607a968700eda8b84, Subject:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:EC, Length:384, Cert Id:-462931589, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:48.922 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:2, Subject:CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO, Issuer:CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO, Key type:RSA, Length:4096, Cert Id:1264269967, Valid from:10/26/10, 10:28 AM, Valid until:10/26/40, 10:28 AM
2023-10-26 10:38:48.922 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withECDSA, Serial:d6a5f083f285c3e5195df5d, Subject:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:256, Cert Id:948272517, Valid from:8/23/17, 9:35 PM, Valid until:8/23/42, 9:35 PM
2023-10-26 10:38:48.922 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:7c4f04391cd4992d, Subject:CN=AffirmTrust Networking, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Networking, O=AffirmTrust, C=US, Key type:RSA, Length:2048, Cert Id:651670175, Valid from:1/29/10, 3:08 PM, Valid until:12/31/30, 3:08 PM
2023-10-26 10:38:49.195 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:fedce3010fc948ff, Subject:CN=Certigna, O=Dhimyotis, C=FR, Issuer:CN=Certigna, O=Dhimyotis, C=FR, Key type:RSA, Length:2048, Cert Id:-788091456, Valid from:6/29/07, 5:13 PM, Valid until:6/29/27, 5:13 PM
2023-10-26 10:38:49.196 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Issuer:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Key type:RSA, Length:2048, Cert Id:1093603654, Valid from:11/25/13, 9:25 AM, Valid until:10/25/43, 9:25 AM
2023-10-26 10:38:49.196 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:200605167002, Subject:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Issuer:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Key type:RSA, Length:2048, Cert Id:-289960676, Valid from:7/4/06, 7:20 PM, Valid until:7/4/31, 7:20 PM
2023-10-26 10:38:49.196 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:78585f2ead2c194be3370735341328b596d46593, Subject:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:-762436034, Valid from:1/12/12, 6:27 PM, Valid until:1/12/42, 6:27 PM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:203e5c068ef631a9c72905052, Subject:CN=GTS Root R4, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R4, O=Google Trust Services LLC, C=US, Key type:EC, Length:384, Cert Id:1326433111, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:a68b79290000000050d091f9, Subject:CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Key type:EC, Length:384, Cert Id:924514073, Valid from:12/18/12, 4:25 PM, Valid until:12/18/37, 4:55 PM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:20000b9, Subject:CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE, Issuer:CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE, Key type:RSA, Length:2048, Cert Id:1425294543, Valid from:5/12/00, 8:46 PM, Valid until:5/13/25, 1:59 AM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:5a4bbd5afb4f8a5bfa65e5, Subject:CN=GLOBALTRUST 2020, O=e-commerce monitoring GmbH, C=AT, Issuer:CN=GLOBALTRUST 2020, O=e-commerce monitoring GmbH, C=AT, Key type:RSA, Length:4096, Cert Id:-522246883, Valid from:2/10/20, 1:00 AM, Valid until:6/10/40, 2:00 AM
2023-10-26 10:38:49.198 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:3863def8, Subject:CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net, Issuer:CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net, Key type:RSA, Length:2048, Cert Id:-328536082, Valid from:12/24/99, 6:50 PM, Valid until:7/24/29, 4:15 PM
2023-10-26 10:38:49.198 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:788f275c81125220a504d02dddba73f4, Subject:CN=Certum EC-384 CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Issuer:CN=Certum EC-384 CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Key type:EC, Length:384, Cert Id:994586241, Valid from:3/26/18, 9:24 AM, Valid until:3/26/43, 8:24 AM
2023-10-26 10:38:49.198 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:15c8bd65475cafb897005ee406d2bc9d, Subject:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Issuer:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Key type:RSA, Length:4096, Cert Id:-662636137, Valid from:12/20/04, 3:31 AM, Valid until:12/20/34, 3:31 AM
2023-10-26 10:38:49.199 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Issuer:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:1825617644, Valid from:6/29/04, 7:39 PM, Valid until:6/29/34, 7:39 PM
2023-10-26 10:38:49.199 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:ce7e0e517d846fe8fe560fc1bf03039, Subject:CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:-860404528, Valid from:11/10/06, 1:00 AM, Valid until:11/10/31, 1:00 AM
2023-10-26 10:38:49.728 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:203e5b882eb20f825276d3d66, Subject:CN=GTS Root R3, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R3, O=Google Trust Services LLC, C=US, Key type:EC, Length:384, Cert Id:1163081155, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:49.729 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:-1238464039, Valid from:10/1/08, 12:40 PM, Valid until:10/2/33, 1:59 AM
2023-10-26 10:38:49.729 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:50946cec18ead59c4dd597ef758fa0ad, Subject:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Issuer:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Key type:RSA, Length:2048, Cert Id:-952474086, Valid from:11/1/04, 6:14 PM, Valid until:1/1/35, 6:37 AM
2023-10-26 10:38:49.729 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:5ec3b7a6437fa4e0, Subject:C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1, Issuer:C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1, Key type:RSA, Length:4096, Cert Id:-592111236, Valid from:5/5/11, 11:37 AM, Valid until:12/31/30, 10:37 AM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:d65d9bb378812eeb, Subject:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:EC, Length:384, Cert Id:2131361491, Valid from:6/16/16, 7:15 AM, Valid until:1/18/38, 6:15 AM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:5c6, Subject:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:1470392860, Valid from:11/24/06, 8:11 PM, Valid until:11/24/31, 8:06 PM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:3e8, Subject:CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK, Issuer:CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK, Key type:RSA, Length:2048, Cert Id:-1426826250, Valid from:5/15/03, 7:13 AM, Valid until:5/15/23, 6:52 AM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:8165f8a4ca5ec00c99340dfc4c6ae23b81c5aa4, Subject:CN=Hongkong Post Root CA 3, O=Hongkong Post, L=Hong Kong, ST=Hong Kong, C=HK, Issuer:CN=Hongkong Post Root CA 3, O=Hongkong Post, L=Hong Kong, ST=Hong Kong, C=HK, Key type:RSA, Length:4096, Cert Id:-901951080, Valid from:6/3/17, 4:29 AM, Valid until:6/3/42, 4:29 AM
2023-10-26 10:38:49.731 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:cbe, Subject:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:4096, Cert Id:861175838, Valid from:6/27/12, 8:28 AM, Valid until:12/31/30, 4:59 PM
2023-10-26 10:38:49.731 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:6e6abc59aa53be983967a2d26ba43be66d1cd6da, Subject:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:EC, Length:384, Cert Id:268503342, Valid from:7/31/18, 9:26 AM, Valid until:7/31/43, 9:26 AM
2023-10-26 10:38:49.731 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:da9bec71f303b019, Subject:CN=TrustCor RootCert CA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Issuer:CN=TrustCor RootCert CA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Key type:RSA, Length:2048, Cert Id:1332877130, Valid from:2/4/16, 1:32 PM, Valid until:12/31/29, 6:23 PM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:439600313, Valid from:9/1/09, 2:00 AM, Valid until:1/1/38, 12:59 AM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:5f70e86da49f346352ebab2, Subject:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:RSA, Length:4096, Cert Id:416366836, Valid from:8/23/17, 9:34 PM, Valid until:8/23/42, 9:34 PM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:b931c3ad63967ea6723bfc3af9af44b, Subject:CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:-385398383, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:2048, Cert Id:1521072570, Valid from:5/29/09, 7:00 AM, Valid until:5/29/29, 7:00 AM
2023-10-26 10:38:49.933 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:40000000001154b5ac394, Subject:CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE, Issuer:CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE, Key type:RSA, Length:2048, Cert Id:536948034, Valid from:9/1/98, 2:00 PM, Valid until:1/28/28, 1:00 PM
2023-10-26 10:38:49.933 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:cae91b89f155030da3e6416dc4e3a6e1, Subject:CN=Certigna Root CA, OU=0002 48146308100036, O=Dhimyotis, C=FR, Issuer:CN=Certigna Root CA, OU=0002 48146308100036, O=Dhimyotis, C=FR, Key type:RSA, Length:4096, Cert Id:356684591, Valid from:10/1/13, 10:32 AM, Valid until:10/1/33, 10:32 AM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:983f3, Subject:CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:1430153102, Valid from:11/5/09, 9:35 AM, Valid until:11/5/29, 9:35 AM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:1675f27d6fe7ae3e4acbe095b059e, Subject:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Issuer:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Key type:RSA, Length:4096, Cert Id:-821903320, Valid from:11/29/18, 12:55 PM, Valid until:11/29/43, 12:55 PM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:c27e43044e473f19, Subject:EMAILADDRESS=in...@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Issuer:EMAILADDRESS=in...@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:-1903950012, Valid from:6/16/09, 1:30 PM, Valid until:12/30/29, 12:30 PM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:31f5e4620c6c58edd6d8, Subject:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:RSA, Length:2048, Cert Id:392709196, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:445734245b81899b35f2ceb82b3b5ba726f07528, Subject:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:696763521, Valid from:1/12/12, 7:59 PM, Valid until:1/12/42, 7:59 PM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:bb401c43f55e4fb0, Subject:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:1516221943, Valid from:10/25/06, 10:30 AM, Valid until:10/25/36, 10:30 AM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:2c17087d642ac0fe85185906cfb44aeb, Subject:CN=BJCA Global Root CA2, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Issuer:CN=BJCA Global Root CA2, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Key type:EC, Length:384, Cert Id:1781225575, Valid from:12/19/19, 4:18 AM, Valid until:12/12/44, 4:18 AM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:66c9fcf99bf8c0a39e2f0788a43e696365bca, Subject:CN=Amazon Root CA 1, O=Amazon, C=US, Issuer:CN=Amazon Root CA 1, O=Amazon, C=US, Key type:RSA, Length:2048, Cert Id:-1472444962, Valid from:5/26/15, 2:00 AM, Valid until:1/17/38, 1:00 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:1964785574, Valid from:9/1/09, 2:00 AM, Valid until:1/1/38, 12:59 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:43e37113d8b359145db7ce8cfd35fd6fbc058d45, Subject:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:RSA, Length:4096, Cert Id:-1825883750, Valid from:7/31/18, 9:24 AM, Valid until:7/31/43, 9:24 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:203e5aec58d04251aab1125aa, Subject:CN=GTS Root R2, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R2, O=Google Trust Services LLC, C=US, Key type:RSA, Length:4096, Cert Id:948387669, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:92b888dbb08ac163, Subject:CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK, Issuer:CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK, Key type:RSA, Length:4096, Cert Id:747175721, Valid from:7/19/12, 11:15 AM, Valid until:7/19/42, 11:15 AM
2023-10-26 10:38:49.937 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:444c0, Subject:CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Issuer:CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Key type:RSA, Length:2048, Cert Id:2014002193, Valid from:10/22/08, 2:07 PM, Valid until:12/31/29, 1:07 PM
2023-10-26 10:38:49.937 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:4caaf9cadb636fe01ff74ed85b03869d, Subject:CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:RSA, Length:4096, Cert Id:1769425049, Valid from:1/19/10, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:49.937 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:76b1205274f0858746b3f8231af6c2c0, Subject:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:RSA, Length:2048, Cert Id:-613481516, Valid from:12/1/14, 4:00 PM, Valid until:12/1/39, 4:10 PM
2023-10-26 10:38:50.106 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:9e09365acf7d9c8b93e1c0b042a2ef3, Subject:CN=DigiCert TLS ECC P384 Root G5, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert TLS ECC P384 Root G5, O="DigiCert, Inc.", C=US, Key type:EC, Length:384, Cert Id:-354195278, Valid from:1/15/21, 1:00 AM, Valid until:1/15/46, 12:59 AM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:7777062726a9b17c, Subject:CN=AffirmTrust Commercial, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Commercial, O=AffirmTrust, C=US, Key type:RSA, Length:2048, Cert Id:630485644, Valid from:1/29/10, 3:06 PM, Valid until:12/31/30, 3:06 PM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:1f47afaa62007050544c019e9b63992a, Subject:CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:EC, Length:384, Cert Id:1146488932, Valid from:3/6/08, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:2ac5c266a0b409b8f0b79f2ae462577, Subject:CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:-1410680354, Valid from:11/10/06, 1:00 AM, Valid until:11/10/31, 1:00 AM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withECDSA, Serial:66c9fd5749736663f3b0b9ad9e89e7603f24a, Subject:CN=Amazon Root CA 3, O=Amazon, C=US, Issuer:CN=Amazon Root CA 3, O=Amazon, C=US, Key type:EC, Length:256, Cert Id:-1562287523, Valid from:5/26/15, 2:00 AM, Valid until:5/26/40, 2:00 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:2, Subject:CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO, Issuer:CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO, Key type:RSA, Length:4096, Cert Id:969960563, Valid from:10/26/10, 10:38 AM, Valid until:10/26/40, 10:38 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:45e6bb038333c3856548e6ff4551, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6, Key type:RSA, Length:4096, Cert Id:-506627753, Valid from:12/10/14, 1:00 AM, Valid until:12/10/34, 1:00 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:11d2bbba336ed4bce62468c50d841d98e843, Subject:CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE, Issuer:CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE, Key type:EC, Length:384, Cert Id:-889363391, Valid from:3/20/19, 1:00 AM, Valid until:3/20/46, 1:00 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:203e5936f31b01349886ba217, Subject:CN=GTS Root R1, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R1, O=Google Trust Services LLC, C=US, Key type:RSA, Length:4096, Cert Id:657172038, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:50.394 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:4000000000121585308a2, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3, Key type:RSA, Length:2048, Cert Id:733875591, Valid from:3/18/09, 11:00 AM, Valid until:3/18/29, 11:00 AM
2023-10-26 10:38:50.394 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:ba15afa1ddfa0b54944afcd24a06cec, Subject:CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:EC, Length:384, Cert Id:-645537245, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:50.394 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:6a683e9c519bcb53, Subject:CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR, Issuer:CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR, Key type:RSA, Length:4096, Cert Id:-673382379, Valid from:3/5/13, 1:09 PM, Valid until:3/3/23, 1:09 PM
2023-10-26 10:38:50.395 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:25a1dfca33cb5902, Subject:CN=TrustCor RootCert CA-2, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Issuer:CN=TrustCor RootCert CA-2, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Key type:RSA, Length:4096, Cert Id:1646661199, Valid from:2/4/16, 1:32 PM, Valid until:12/31/34, 6:26 PM
2023-10-26 10:38:50.395 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:6d8c1446b1a60aee, Subject:CN=AffirmTrust Premium, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Premium, O=AffirmTrust, C=US, Key type:RSA, Length:4096, Cert Id:-2130283955, Valid from:1/29/10, 3:10 PM, Valid until:12/31/40, 3:10 PM
2023-10-26 10:38:50.395 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withECDSA, Serial:75e6dfcbc1685ba8, Subject:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:-1368293613, Valid from:2/12/16, 7:14 PM, Valid until:2/12/41, 7:14 PM
2023-10-26 10:38:50.396 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:1b70e9d2ffae6c71, Subject:CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES, Issuer:CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES, Key type:RSA, Length:4096, Cert Id:-1766730314, Valid from:9/23/14, 5:22 PM, Valid until:5/5/36, 5:22 PM
2023-10-26 10:38:50.396 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:59b1b579e8e2132e23907bda777755c, Subject:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:4096, Cert Id:1057369358, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:50.397 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:67749d8d77d83b6adb22f4ff59e2bfce, Subject:CN=HARICA TLS ECC Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Issuer:CN=HARICA TLS ECC Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Key type:EC, Length:384, Cert Id:-693932344, Valid from:2/19/21, 12:01 PM, Valid until:2/13/45, 12:01 PM
2023-10-26 10:38:50.397 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:556f65e3b4d9906a1b09d16c3ec06c20, Subject:CN=BJCA Global Root CA1, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Issuer:CN=BJCA Global Root CA1, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Key type:RSA, Length:4096, Cert Id:-1889263367, Valid from:12/19/19, 4:16 AM, Valid until:12/12/44, 4:16 AM
2023-10-26 10:38:50.397 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:983f4, Subject:CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:971313728, Valid from:11/5/09, 9:50 AM, Valid until:11/5/29, 9:50 AM
2023-10-26 10:38:50.398 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withECDSA, Serial:0, Subject:CN=Hellenic Academic and Research Institutions ECC RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Issuer:CN=Hellenic Academic and Research Institutions ECC RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Key type:EC, Length:384, Cert Id:513613456, Valid from:7/7/15, 12:37 PM, Valid until:6/30/40, 12:37 PM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:33af1e6a711a9a0bb2864b11d09fae5, Subject:CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:1136084297, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:1894096264, Valid from:10/1/08, 12:29 PM, Valid until:10/2/33, 1:59 AM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d, Subject:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:-705622991, Valid from:1/12/12, 9:26 PM, Valid until:1/12/42, 9:26 PM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:2dddacce629794a143e8b0cd766a5e60, Subject:CN=HiPKI Root CA - G1, O="Chunghwa Telecom Co., Ltd.", C=TW, Issuer:CN=HiPKI Root CA - G1, O="Chunghwa Telecom Co., Ltd.", C=TW, Key type:RSA, Length:4096, Cert Id:-2016358144, Valid from:2/22/19, 10:46 AM, Valid until:12/31/37, 4:59 PM
2023-10-26 10:38:50.676 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:50.780 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:50.781 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:509, Subject:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:338250116, Valid from:11/24/06, 7:27 PM, Valid until:11/24/31, 7:23 PM
2023-10-26 10:38:50.781 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withECDSA, Serial:15448ef21fd97590df5040a, Subject:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Issuer:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Key type:EC, Length:256, Cert Id:-991173715, Valid from:8/22/17, 2:07 PM, Valid until:8/22/42, 2:07 PM
2023-10-26 10:38:50.781 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:83be056904246b1a1756ac95991c74a, Subject:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:1341898239, Valid from:11/10/06, 1:00 AM, Valid until:11/10/31, 1:00 AM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA512withRSA, Serial:21d6d04a4f250fc93237fcaa5e128de9, Subject:CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Issuer:CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Key type:RSA, Length:4096, Cert Id:1983350452, Valid from:10/6/11, 10:39 AM, Valid until:10/6/46, 10:39 AM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:aecf00bac4cf32f843b2, Subject:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:RSA, Length:2048, Cert Id:-1268863356, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:194301ea20bddf5c5332ab1434471f8d6504d0d, Subject:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Issuer:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Key type:RSA, Length:4096, Cert Id:1777546867, Valid from:8/18/17, 10:58 AM, Valid until:8/19/37, 1:59 AM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withRSA, Serial:1fd6d30fca3ca51a81bbc640e35032d, Subject:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:RSA, Length:4096, Cert Id:-347365895, Valid from:2/1/10, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA384withECDSA, Serial:7cc98f2b84d7dfea0fc9659ad34b4d96, Subject:CN=D-TRUST BR Root CA 1 2020, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST BR Root CA 1 2020, O=D-Trust GmbH, C=DE, Key type:EC, Length:384, Cert Id:-83817738, Valid from:2/11/20, 10:45 AM, Valid until:2/11/35, 10:44 AM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:8e0ff94b907168653354f4d44439b7e0, Subject:CN=Certainly Root R1, O=Certainly, C=US, Issuer:CN=Certainly Root R1, O=Certainly, C=US, Key type:RSA, Length:4096, Cert Id:-2039008761, Valid from:4/1/21, 2:00 AM, Valid until:4/1/46, 2:00 AM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:8210cfb0d240e3594463e0bb63828b00, Subject:CN=ISRG Root X1, O=Internet Security Research Group, C=US, Issuer:CN=ISRG Root X1, O=Internet Security Research Group, C=US, Key type:RSA, Length:4096, Cert Id:1521974916, Valid from:6/4/15, 1:04 PM, Valid until:6/4/35, 1:04 PM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:95be16a0f72e46f17b398272fa8bcd96, Subject:CN=TeliaSonera Root CA v1, O=TeliaSonera, Issuer:CN=TeliaSonera Root CA v1, O=TeliaSonera, Key type:RSA, Length:4096, Cert Id:1495358374, Valid from:10/18/07, 2:00 PM, Valid until:10/18/32, 2:00 PM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:7d0997fef047ea7a, Subject:CN=GDCA TrustAUTH R5 ROOT, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", C=CN, Issuer:CN=GDCA TrustAUTH R5 ROOT, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", C=CN, Key type:RSA, Length:4096, Cert Id:494136981, Valid from:11/26/14, 6:13 AM, Valid until:12/31/40, 4:59 PM
2023-10-26 10:38:50.784 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA1withRSA, Serial:456b5054, Subject:CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:-1261404096, Valid from:11/27/06, 9:23 PM, Valid until:11/27/26, 9:53 PM
2023-10-26 10:38:50.784 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:a0142800000014523cf467c00000002, Subject:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Issuer:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Key type:RSA, Length:4096, Cert Id:2123370772, Valid from:1/16/14, 6:53 PM, Valid until:1/16/34, 6:53 PM
2023-10-26 10:38:50.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:56b629cd34bc78f6, Subject:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:1381862403, Valid from:5/31/17, 8:14 PM, Valid until:5/30/42, 8:14 PM
2023-10-26 10:38:50.915 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security : X509Certificate: Alg:SHA256withRSA, Serial:521be50a, Subject:CN=cas.example.org, OU=Example, OU=Org, C=US, Issuer:CN=cas.example.org, OU=Example, OU=Org, C=US, Key type:RSA, Length:2048, Cert Id:-752812843, Valid from:9/25/23, 3:22 PM, Valid until:12/24/23, 2:22 PM
2023-10-26 10:38:50.941 ERROR 36220 --- [nio-8081-exec-2] org.jasig.cas.client.util.CommonUtils : SSL error getting response from host: echempad-cas.iciq.es : Error Message: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
... 82 common frames omitted
2023-10-26 10:38:50.996 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:50.996 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:51.218 ERROR 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet] : Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception
java.lang.RuntimeException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:463) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
... 59 common frames omitted
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
... 82 common frames omitted
2023-10-26 10:38:51.479 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[Tomcat].[localhost] : Processing ErrorPage[errorCode=0, location=/error]
2023-10-26 10:38:51.481 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy : Securing GET /error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox
2023-10-26 10:38:51.482 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:51.482 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorConfigured = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorRequest = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyTicketRequest = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : requiresAuthentication = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.AnonymousAuthenticationFilter : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.session.SessionManagementFilter : Request requested invalid session id BADADABCF18C386D3E3EE2769FC1D53A
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.u.matcher.RegexRequestMatcher : Checking match of request : '/error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:51.485 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:51.485 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:51.486 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.068 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.069 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.069 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.070 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.070 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.072 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.i.FilterSecurityInterceptor : Failed to authorize filter invocation [GET /error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox] with attributes [authenticated]
2023-10-26 10:38:52.073 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.s.HttpSessionRequestCache : Saved request http://echempad.iciq.es:8081/error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox to session
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet] : Disabling the response for further output
2023-10-26 10:38:52.075 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:52.194 DEBUG 36220 --- [nio-8081-exec-2] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:52.194 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:52.194 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer : Received [GET /login/cas?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
]
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.t.util.http.Rfc6265CookieProcessor : Cookies: Parsing b[]: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.catalina.connector.CoyoteAdapter : Requested cookie session id is 2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase : Security checking request GET /login/cas
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] org.apache.catalina.realm.RealmBase : No applicable constraints defined
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase : Not subject to any constraint
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy : Securing GET /login/cas?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = true
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : requiresAuthentication = true
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorConfigured = false
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorRequest = false
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = true
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters : Set encoding to UTF-8
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters : Decoding query null UTF-8
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters : Start processing with input [ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox]
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.c.a.CasAuthenticationProvider : serviceUrl = http://echempad.iciq.es:8081/login/cas
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Placing URL parameters in map.
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Calling template URL attribute map.
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Loading custom parameters from configuration.
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Constructing validation url: https://echempad-cas.iciq.es:8443/cas/p3/serviceValidate?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox&service=http%3A%2F%2Fechempad.iciq.es%3A8081%2Flogin%2Fcas
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator : Retrieving response from server.
2023-10-26 10:38:52.236 ERROR 36220 --- [nio-8081-exec-2] org.jasig.cas.client.util.CommonUtils : SSL error getting response from host: echempad-cas.iciq.es : Error Message: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
... 82 common frames omitted
2023-10-26 10:38:52.611 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:52.611 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:52.612 ERROR 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet] : Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception
java.lang.RuntimeException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:463) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
... 59 common frames omitted
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
... 82 common frames omitted
2023-10-26 10:38:52.838 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[Tomcat].[localhost] : Processing ErrorPage[errorCode=0, location=/error]
2023-10-26 10:38:52.928 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy : Securing GET /error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorConfigured = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorRequest = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : proxyTicketRequest = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter : requiresAuthentication = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.AnonymousAuthenticationFilter : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.u.matcher.RegexRequestMatcher : Checking match of request : '/error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:52.930 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.930 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.931 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.931 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.931 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.932 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.035 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.035 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.035 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.i.FilterSecurityInterceptor : Failed to authorize filter invocation [GET /error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox] with attributes [authenticated]
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.s.HttpSessionRequestCache : Saved request http://echempad.iciq.es:8081/error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox to session
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet] : Disabling the response for further output
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [0]
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer : Received []
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.apache.coyote.http11.Http11Processor : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Status in: [OPEN_READ], State out: [OPEN]
2023-10-26 10:38:53.063 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint : Registered read interest for [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]]
2023-10-26 10:38:53.071 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.072 DEBUG 36220 --- [nio-8081-exec-3] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.072 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:53.072 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer : Received [GET /login/cas?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
]
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.t.util.http.Rfc6265CookieProcessor : Cookies: Parsing b[]: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.catalina.connector.CoyoteAdapter : Requested cookie session id is 2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.authenticator.AuthenticatorBase : Security checking request GET /login/cas
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] org.apache.catalina.realm.RealmBase : No applicable constraints defined
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.authenticator.AuthenticatorBase : Not subject to any constraint
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.security.web.FilterChainProxy : Securing GET /login/cas?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = true
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : requiresAuthentication = true
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorConfigured = false
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorRequest = false
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = true
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.http.Parameters : Set encoding to UTF-8
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.http.Parameters : Decoding query null UTF-8
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.http.Parameters : Start processing with input [ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox]
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.c.a.CasAuthenticationProvider : serviceUrl = http://echempad.iciq.es:8081/login/cas
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator : Placing URL parameters in map.
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator : Calling template URL attribute map.
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator : Loading custom parameters from configuration.
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator : Constructing validation url: https://echempad-cas.iciq.es:8443/cas/p3/serviceValidate?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox&service=http%3A%2F%2Fechempad.iciq.es%3A8081%2Flogin%2Fcas
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator : Retrieving response from server.
2023-10-26 10:38:53.156 ERROR 36220 --- [nio-8081-exec-3] org.jasig.cas.client.util.CommonUtils : SSL error getting response from host: echempad-cas.iciq.es : Error Message: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
... 82 common frames omitted
2023-10-26 10:38:53.284 DEBUG 36220 --- [nio-8081-exec-3] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.284 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:53.285 ERROR 36220 --- [nio-8081-exec-3] o.a.c.c.C.[.[.[/].[dispatcherServlet] : Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception
java.lang.RuntimeException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:463) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
... 59 common frames omitted
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
... 82 common frames omitted
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.c.C.[Tomcat].[localhost] : Processing ErrorPage[errorCode=0, location=/error]
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.security.web.FilterChainProxy : Securing GET /error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : serviceTicketRequest = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorConfigured = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : proxyReceptorRequest = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : proxyTicketRequest = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter : requiresAuthentication = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.a.AnonymousAuthenticationFilter : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.u.matcher.RegexRequestMatcher : Checking match of request : '/error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:53.525 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.525 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.525 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.555 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.557 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.a.i.FilterSecurityInterceptor : Failed to authorize filter invocation [GET /error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox] with attributes [authenticated]
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.s.HttpSessionRequestCache : Saved request http://echempad.iciq.es:8081/error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox to session
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.c.C.[.[.[/].[dispatcherServlet] : Disabling the response for further output
2023-10-26 10:38:53.566 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.566 DEBUG 36220 --- [nio-8081-exec-3] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.567 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [0]
2023-10-26 10:38:53.600 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer : Received []
2023-10-26 10:38:53.600 DEBUG 36220 --- [nio-8081-exec-3] o.apache.coyote.http11.Http11Processor : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Status in: [OPEN_READ], State out: [OPEN]
2023-10-26 10:38:53.600 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.net.NioEndpoint : Registered read interest for [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] o.a.coyote.http11.Http11InputBuffer : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] o.a.tomcat.util.net.SocketWrapperBase : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] org.apache.tomcat.util.net.NioEndpoint : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] o.a.coyote.http11.Http11InputBuffer : Received [GET /login/cas?ticket=ST-4-rDXa9uLwOv-bJShAfSIgreEoyMQ-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
]
2023-10-26 10:38:53.602 DEBUG 36220 --- [nio-8081-exec-4] o.a.t.util.http.Rfc6265CookieProcessor : Cookies: Parsing b[]: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.602 DEBUG 36220 --- [nio-8081-exec-4] o.a.catalina.connector.CoyoteAdapter : Requested cookie session id is 2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.603 DEBUG 36220 --- [nio-8081-exec-4] o.a.c.authenticator.AuthenticatorBase : Security checking request GET /login/cas
2023-10-26 10:38:53.627 DEBUG 36220 --- [nio-8081-exec-4] org.apache.catalina.realm.RealmBase : No applicable constraints defined
2023-10-26 10:38:53.628 DEBUG 36220 --- [nio-8081-exec-4] o.a.c.authenticator.AuthenticatorBase : Not subject to any constraint
Sorry that I can't explain better what my problem is but I have been trying to fix this for days and I am starting to feel that I need some help.
If you need any other information please request it without hesitation.
Thank you so much.
Aleix