Application and CAS server enter into infinite redirect loop

381 views
Skip to first unread message

Aleix Mariné

unread,
Oct 26, 2023, 5:49:21 AM10/26/23
to CAS Community
Hello there,

I am trying to configure a Spring Boot (backend) + ZK (frontend) application with ZK. I am following the tutorials but I am not sure why is not working: After entering into my app, I get redirected to the login page of my CAS overlay, but when I introduce my credentials in there and I get redirected into my application, the application sends redirect to CAS as if I was not authenticated. After that, CAS sends me back to the app and so on, which makes me enter into an infinite loops of redirects.

I have seen also an error in the logs "unable to find valid certiciation path to requested target", which is a SSL error. Even if I put the CAS server certificate in the truststore of my app, the error keeps appearing. My app does use HTTP and CAS uses HTTPS...

Anyway, I think that the SSL error is related to the infinite redirection loop, but it is not the main cause of it. I think there is something wrong with my security configuration. 

I will post first the CAS beans:

@Component
public class CasSecuredApplication {

    @Autowired
    UserDetailsServiceImpl userDetailsService;

    // login
    @Bean
    public AuthenticationManager authenticationManager(CasAuthenticationProvider casAuthenticationProvider) {
        return new ProviderManager(Arrays.asList(casAuthenticationProvider));
    }

    @Bean
    public CasAuthenticationFilter casAuthenticationFilter(
            ServiceProperties serviceProperties, AuthenticationManager authenticationManager) throws Exception {
        CasAuthenticationFilter filter = new CasAuthenticationFilter();
        filter.setAuthenticationManager(authenticationManager);
        filter.setServiceProperties(serviceProperties);
        return filter;
    }

    @Bean
    public ServiceProperties serviceProperties() {
        ServiceProperties serviceProperties = new ServiceProperties();
        serviceProperties.setService("http://echempad.iciq.es:8081/login/cas");
        serviceProperties.setSendRenew(false);
        //serviceProperties.setArtifactParameter(DEFAULT_CAS_ARTIFACT_PARAMETER);
        return serviceProperties;
    }

    @Bean
    public TicketValidator ticketValidator() {
        return new Cas30ServiceTicketValidator("https://echempad-cas.iciq.es:8443/cas");
    }

    @Bean
    public CasAuthenticationProvider casAuthenticationProvider(
            TicketValidator ticketValidator,
            ServiceProperties serviceProperties) {
        CasAuthenticationProvider provider = new CasAuthenticationProvider();
        provider.setServiceProperties(serviceProperties);
        provider.setTicketValidator(ticketValidator);

        // Static login
        //provider.setUserDetailsService(s -> new User("casuser", "Mellon", true, true, true, true, AuthorityUtils.createAuthorityList("ROLE_ADMIN")));
        provider.setUserDetailsService(this.userDetailsService);
        provider.setKey("CAS_PROVIDER_LOCALHOST_8081");
        return provider;
    }

    @Bean
    @Primary
    public AuthenticationEntryPoint casAuthenticationEntryPoint(ServiceProperties serviceProperties)
    {
        CasAuthenticationEntryPoint casAuthenticationEntryPoint = new CasAuthenticationEntryPoint();
        casAuthenticationEntryPoint.setServiceProperties(serviceProperties);
        // TODO: this url needs to be parametrized for developer / production mode
        casAuthenticationEntryPoint.setLoginUrl("https://echempad-cas.iciq.es:8443/cas/login");
        return casAuthenticationEntryPoint;

    }

    @Bean
    public AuthenticationUserDetailsService<Authentication> authenticationUserDetailsService() {
        UserDetailsByNameServiceWrapper<Authentication> serviceWrapper = new UserDetailsByNameServiceWrapper<>();
        serviceWrapper.setUserDetailsService(this.userDetailsService);
        return serviceWrapper;
    }

    // logout

    @Bean
    public SecurityContextLogoutHandler securityContextLogoutHandler() {
        return new SecurityContextLogoutHandler();
    }

    @Bean
    @Autowired
    public LogoutFilter logoutFilter(SecurityContextLogoutHandler securityContextLogoutHandler) {
        LogoutFilter logoutFilter = new LogoutFilter(
                "https://echempad-cas.iciq.es:8443/cas/logout",
                securityContextLogoutHandler);
        logoutFilter.setFilterProcessesUrl("/logout/cas");
        return logoutFilter;
    }

    @Bean
    public SingleSignOutFilter singleSignOutFilter() {
        SingleSignOutFilter singleSignOutFilter = new SingleSignOutFilter();
        singleSignOutFilter.setLogoutCallbackPath("https://echempad-cas.iciq.es:8443/cas");
        singleSignOutFilter.setIgnoreInitConfiguration(true);
        return singleSignOutFilter;
    }

}


And the security config:

@EnableWebSecurity
@Configuration
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {

    /**
     * Sets the state of the CSRF protection
     */
    @Value("${eChempad.security.csrf}")
    private boolean csrfDisabled;

    /**
     * Sets the state of the CORS protection
     */
    @Value("${eChempad.security.csrf}")
    private boolean corsDisabled;

    /**
     * To provide the {@code UserDetailsService} for authentication purposes.
     */
    @Autowired
    private UserDetailsService userDetailsService;

    /**
     * To integrate CAS with its entrypoint (service login url)
     */
    @Autowired
    private AuthenticationEntryPoint authenticationEntryPoint;

    /**
     * For CAS integration
     */
    @Autowired
    private AuthenticationProvider authenticationProvider;

    /**
     * For CAS authentication
     */
    @Autowired
    private CasAuthenticationFilter casAuthenticationFilter;

    /**
     * Allow everyone to access the login and logout form and allow everyone to access the login API calls.
     * Allow only authenticated users to access the API.
     *
     * @see <a href="https://www.zkoss.org/wiki/ZK%20Developer's%20Reference/Security%20Tips/Cross-site%20Request%20Forgery">...</a>
     * @see <a href="https://stackoverflow.com/questions/2952196/ant-path-style-patterns">...</a>
     * @see <a href="https://stackoverflow.com/questions/57574981/what-is-httpbasic-method-in-spring-security">...</a>
     * @see <a href="https://javabydeveloper.com/refused-to-display-in-a-frame-because-it-set-x-frame-options-to-deny-in-spring/">...</a>
     * @param http HTTP security class. Can be used to configure a lot of different parameters regarding HTTP security.
     * @throws Exception Any type of exception that occurs during the HTTP configuration
     */
    @Override
    protected void configure(@NotNull HttpSecurity http) throws Exception {

        // ZUL files regexp execution time
        String zulFiles = "/zkau/web/**/*.zul";

        // Web files regexp execution time
        String[] zkResources = {"/zkau/web/**/js/**", "/zkau/web/**/zul/css/**", "/zkau/web/**/img/**"};

        // Allow desktop cleanup after logout or when reloading login page
        String removeDesktopRegex = "/zkau\\?dtid=.*&cmd_0=rmDesktop&.*";

        // Anonymous accessible pages
        String[] anonymousPages = new String[]{"/login","/logout", "/timeout", "/help", "/exit"};

        // Pages that need authentication: CRUD API & ZK page
        String[] authenticatedPages = new String[]{"/api/**", "/profile", "/"};

        // you need to disable spring CSRF to make ZK AU pass security filter
        // ZK already sends a AJAX request with a built-in CSRF token,
        http.csrf().disable();

        // Conditional activation depending on profile
        if (! this.corsDisabled) {
            http.cors().disable();
        }

        http
                .addFilter(this.casAuthenticationFilter)
                // allows the basic HTTP authentication. If the user cannot be authenticated using HTTP auth headers it
                // will show a 401 unauthenticated*/
                    .httpBasic()
                    .authenticationEntryPoint(this.authenticationEntryPoint)
                .and()
                    .logout()
                    .logoutRequestMatcher(new AntPathRequestMatcher("/logout"))
                .and()
                    .headers()
                    .frameOptions()
                    .sameOrigin() // X-Frame-Options = SAMEORIGIN

                // API endpoints protection
                .and()
                    .authorizeRequests()
                    .antMatchers("/api/authority").authenticated()
                    .antMatchers("/api/researcher").authenticated()
                    .antMatchers("/api/journal").authenticated()
                    .antMatchers("/api/experiment").authenticated()
                    .antMatchers("/api/document").authenticated()
                    .antMatchers("/api/**").authenticated()

                // For the GUI with ZKoss
                .and()
                .authorizeRequests()
                    .antMatchers(zulFiles).denyAll()  // Block direct access to zul files
                    .antMatchers(HttpMethod.GET, zkResources).permitAll()  // Allow ZK resources
                    .regexMatchers(HttpMethod.GET, removeDesktopRegex).permitAll()  // Allow desktop cleanup
                    // Allow desktop cleanup from ZATS
                    .requestMatchers(req -> "rmDesktop".equals(req.getParameter("cmd_0"))).permitAll()
                    // Allow unauthenticated access to log in, log out, exit, help, report bug...
                    .mvcMatchers(anonymousPages).permitAll()
                    // Only allow authenticated users in the ZK main page and in the API endpoints
                    .mvcMatchers(authenticatedPages).hasRole("USER")


                // Creates the http form login in the default URL /login· The first parameter is a string corresponding
                // to the URL where we will map the login form
                /*.and()
                    .formLogin()
                    .loginPage("/login")
                    .defaultSuccessUrl("/")  // Successful redirect URL after login is root page

                // Creates a logout form

                .and()
                    .logout()
                    .logoutUrl("/logout")
                    .logoutSuccessUrl("/login")  // After logout, redirect to login page
                */

                // Any other requests have to be authenticated too
                .and()
                    .authorizeRequests()
                    .anyRequest()
                    .authenticated();

    }


    /**
     * Configures the authentication. Currently, it is done simply by providing a {@code UserDetailsService}, which
     * uses the database to get user information username and password
     * WARNING! This method is executed before the initialization method in ApplicationStartup, so if the database is
     * not already initialized with the users that we want to authorize we will not be able to input requests from any
     * users, even if they have been loaded afterwards.
     *
     * @see <a href="https://www.arteco-consulting.com/securizando-una-aplicacion-con-spring-boot/">...</a>
     * @param authenticationBuilder Object instance used to build authentication objects.
     * @throws Exception Any type of exception
     */
    @Autowired
    @Transactional
    public void configureGlobal(AuthenticationManagerBuilder authenticationBuilder) throws Exception
    {
        authenticationBuilder
                    // Provide the service to retrieve user details
                    .userDetailsService(this.userDetailsService)
                    // Provide the password encoder used to store password in the database
                    .passwordEncoder(WebSecurityConfig.passwordEncoder())

                .and()
                    // CAS authentication provider
                    .authenticationProvider(this.authenticationProvider);
    }

    @Override
    protected AuthenticationManager authenticationManager() throws Exception {
        return new ProviderManager(Arrays.asList(authenticationProvider));
    }

    /**
     * Bean that returns the password encoder used for hashing passwords.
     *
     * @return Returns an instance of encode, which can be used by accessing to encode(String) method
     */
    @Bean()
    public static PasswordEncoder passwordEncoder()
    {
        return NoOpPasswordEncoder.getInstance();  // TODO: In production change to a safe password encoder
        //return new BCryptPasswordEncoder();
    }

    @Bean
    public static CorsConfigurationSource corsConfigurationSource() {
        CorsConfiguration configuration = new CorsConfiguration();
        configuration.setAllowedOrigins(Collections.singletonList("*"));
        configuration.setAllowedMethods(Collections.singletonList("*"));
        configuration.setAllowedHeaders(Collections.singletonList("*"));
        configuration.setAllowCredentials(true);
        UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
        source.registerCorsConfiguration("/**", configuration);
        return source;
    }


Also, this is the service definition in my custom overlay of CAS:

{
  "@class" :            "org.apereo.cas.services.CasRegisteredService",
  "serviceId" : "http://eChempad.iciq.es:8081/login/cas",
  "name" :              "eChempad",
  "id" :                20170905111650,
  "evaluationOrder" :   10
}


The relevant .properties file of CAS:

## Login and users
# Static login
spring.security.user.name=casuser
spring.security.user.password=secret


## DB config
cas.authn.jdbc.query[0].url=jdbc:postgresql://localhost:5432/eChempad


## Server
# A CAS host is automatically appended to the ticket ids generated by CAS. If none is specified, one is automatically detected and used by CAS.
cas.server.name=https://echempad-cas.iciq.es:8443
cas.server.prefix=https://echempad-cas.iciq.es:8443/cas


## Encryption and keys
# Encryption key of size 512 for Ticket-granting Cookie
cas.tgc.crypto.encryption.key=pTT0PccV7ViNTZYwVgxv_cBOlceDZkGEjgLZtQg74Y4

# Signing key of size 512 for Ticket-granting Cookie
cas.tgc.crypto.signing.key=K5iBLkY4IM-eaheqZfBRnDk4oMcTGhann-tgUQIVG6I7SoXy2sPnXOM6KGZL9SxGeZabvR02Daqmue3SYDqiSQ

# Signing key of size 512 for webflow
cas.webflow.crypto.signing.key=BGCenNkCGJcpAoAMF8xNEPLX5H8BXP6cssc1gDXxGvXOwef8LSZgs5AuR4vm-LNzv9bzMH71ll-25HmqmMB9Ag

# Secret key for encryption of size 16
cas.webflow.crypto.encryption.key=72EBixy4wLsBocfLIr6gbw


## Logging
# prod logger is the default logger
logging.config=file:/etc/cas/config/log4j2-dev.xml
logging.level.org.springframework=DEBUG


Also, here is the part of the log where the infinite redirect loop starts. As you can see, tickets are produced non-stop and if I leave the infinite loop running I can end up with hundreds of tickets in the CAS server:

2023-10-26 10:35:27.595  INFO 36220 --- [           main] o.I.e.c.database.DatabaseInitStartup     : END INITIALIZING DB
2023-10-26 10:35:27.595 DEBUG 36220 --- [           main] o.s.b.a.ApplicationAvailabilityBean      : Application availability state ReadinessState changed to ACCEPTING_TRAFFIC
2023-10-26 10:35:48.115 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:35:48.115 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:35:50.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:35:50.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:16.054 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase  : Start expire sessions StandardManager at 1698309376053 sessioncount 0
2023-10-26 10:36:16.054 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase  : End expire sessions StandardManager processingTime 1 expired sessions: 0
2023-10-26 10:36:18.117 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:18.117 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:20.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:20.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:48.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:48.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:36:50.673 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:36:50.674 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:16.058 DEBUG 36220 --- [alina-utility-1] org.apache.catalina.session.ManagerBase  : Start expire sessions StandardManager at 1698309436058 sessioncount 0
2023-10-26 10:37:16.058 DEBUG 36220 --- [alina-utility-1] org.apache.catalina.session.ManagerBase  : End expire sessions StandardManager processingTime 0 expired sessions: 0
2023-10-26 10:37:18.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:18.118 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:20.674 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:20.674 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:48.119 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:48.119 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:37:50.675 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:37:50.675 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:16.065 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase  : Start expire sessions StandardManager at 1698309496065 sessioncount 0
2023-10-26 10:38:16.065 DEBUG 36220 --- [alina-utility-2] org.apache.catalina.session.ManagerBase  : End expire sessions StandardManager processingTime 0 expired sessions: 0
2023-10-26 10:38:18.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:18.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:20.675 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:20.676 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:23.291 DEBUG 36220 --- [o-8081-Acceptor] o.apache.tomcat.util.threads.LimitLatch  : Counting up[http-nio-8081-Acceptor] latch=1
2023-10-26 10:38:23.323 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [0]
2023-10-26 10:38:23.324 DEBUG 36220 --- [nio-8081-exec-1] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read from buffer: [0]
2023-10-26 10:38:23.325 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read direct from socket: [707]
2023-10-26 10:38:23.325 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer      : Received [GET / HTTP/1.1
Host: localhost:8081
Connection: keep-alive
sec-ch-ua: "Google Chrome";v="113", "Chromium";v="113", "Not-A.Brand";v="24"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Linux"
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=A89D3862AFC825E210BF7A7F25EC9513

]
2023-10-26 10:38:23.340 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.http.Parameters   : Set query string encoding to UTF-8
2023-10-26 10:38:23.341 DEBUG 36220 --- [nio-8081-exec-1] o.a.t.util.http.Rfc6265CookieProcessor   : Cookies: Parsing b[]: JSESSIONID=A89D3862AFC825E210BF7A7F25EC9513
2023-10-26 10:38:23.350 DEBUG 36220 --- [nio-8081-exec-1] o.a.catalina.connector.CoyoteAdapter     :  Requested cookie session id is A89D3862AFC825E210BF7A7F25EC9513
2023-10-26 10:38:23.354 DEBUG 36220 --- [nio-8081-exec-1] o.a.c.authenticator.AuthenticatorBase    : Security checking request GET /
2023-10-26 10:38:23.354 DEBUG 36220 --- [nio-8081-exec-1] org.apache.catalina.realm.RealmBase      :   No applicable constraints defined
2023-10-26 10:38:23.364 DEBUG 36220 --- [nio-8081-exec-1] o.a.c.a.jaspic.AuthConfigFactoryImpl     : Loading persistent provider registrations from [/tmp/tomcat.8081.17214353618447723602/conf/jaspic-providers.xml]
2023-10-26 10:38:23.364 DEBUG 36220 --- [nio-8081-exec-1] o.a.c.authenticator.AuthenticatorBase    : Not subject to any constraint
2023-10-26 10:38:23.366  INFO 36220 --- [nio-8081-exec-1] o.a.c.c.C.[Tomcat].[localhost].[/]       : Initializing Spring DispatcherServlet 'dispatcherServlet'
2023-10-26 10:38:23.366  INFO 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : Initializing Servlet 'dispatcherServlet'
2023-10-26 10:38:23.366 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : Detected StandardServletMultipartResolver
2023-10-26 10:38:23.366 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : Detected AcceptHeaderLocaleResolver
2023-10-26 10:38:23.366 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : Detected FixedThemeResolver
2023-10-26 10:38:23.367 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : Detected org.springframework.web.servlet.view.DefaultRequestToViewNameTranslator@636b542c
2023-10-26 10:38:23.368 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : Detected org.springframework.web.servlet.support.SessionFlashMapManager@6445360b
2023-10-26 10:38:23.368 DEBUG 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : enableLoggingRequestDetails='true': request parameters and headers will be shown which may lead to unsafe logging of potentially sensitive data
2023-10-26 10:38:23.368  INFO 36220 --- [nio-8081-exec-1] o.s.web.servlet.DispatcherServlet        : Completed initialization in 2 ms
2023-10-26 10:38:23.377 DEBUG 36220 --- [nio-8081-exec-1] o.s.security.web.FilterChainProxy        : Securing GET /
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorConfigured = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorRequest = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter    : proxyTicketRequest = false
2023-10-26 10:38:23.380 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.cas.web.CasAuthenticationFilter    : requiresAuthentication = false
2023-10-26 10:38:23.382 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.a.AnonymousAuthenticationFilter  : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:23.382 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.session.SessionManagementFilter  : Request requested invalid session id A89D3862AFC825E210BF7A7F25EC9513
2023-10-26 10:38:23.382 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.u.matcher.RegexRequestMatcher    : Checking match of request : '/'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:23.383 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.http.Parameters   : Set encoding to UTF-8
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.385 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.386 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.386 DEBUG 36220 --- [nio-8081-exec-1] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.zkoss.zkspringboot.ZkHomepageConfiguration#home()
2023-10-26 10:38:23.391 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.a.i.FilterSecurityInterceptor    : Failed to authorize filter invocation [GET /] with attributes [hasRole('ROLE_USER')]
2023-10-26 10:38:23.401 DEBUG 36220 --- [nio-8081-exec-1] o.s.s.w.s.HttpSessionRequestCache        : Saved request http://localhost:8081/ to session
2023-10-26 10:38:23.402 DEBUG 36220 --- [nio-8081-exec-1] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:23.403 DEBUG 36220 --- [nio-8081-exec-1] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:23.403 DEBUG 36220 --- [nio-8081-exec-1] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:23.405 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [707]
2023-10-26 10:38:23.405 DEBUG 36220 --- [nio-8081-exec-1] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read from buffer: [0]
2023-10-26 10:38:23.405 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Read direct from socket: [0]
2023-10-26 10:38:23.406 DEBUG 36220 --- [nio-8081-exec-1] o.a.coyote.http11.Http11InputBuffer      : Received []
2023-10-26 10:38:23.406 DEBUG 36220 --- [nio-8081-exec-1] o.apache.coyote.http11.Http11Processor   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]], Status in: [OPEN_READ], State out: [OPEN]
2023-10-26 10:38:23.406 DEBUG 36220 --- [nio-8081-exec-1] org.apache.tomcat.util.net.NioEndpoint   : Registered read interest for [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@58b582a5:org.apache.tomcat.util.net.NioChannel@4f4c3ccc:java.nio.channels.SocketChannel[connected local=/0:0:0:0:0:0:0:1:8081 remote=/0:0:0:0:0:0:0:1:33976]]
2023-10-26 10:38:48.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:48.120 DEBUG 36220 --- [l-2 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-2 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:48.818 DEBUG 36220 --- [o-8081-Acceptor] o.apache.tomcat.util.threads.LimitLatch  : Counting up[http-nio-8081-Acceptor] latch=2
2023-10-26 10:38:48.820 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [707]
2023-10-26 10:38:48.820 DEBUG 36220 --- [nio-8081-exec-2] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:48.821 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:48.821 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer      : Received [GET /login/cas?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=BADADABCF18C386D3E3EE2769FC1D53A

]
2023-10-26 10:38:48.823 DEBUG 36220 --- [nio-8081-exec-2] o.a.t.util.http.Rfc6265CookieProcessor   : Cookies: Parsing b[]: JSESSIONID=BADADABCF18C386D3E3EE2769FC1D53A
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.a.catalina.connector.CoyoteAdapter     :  Requested cookie session id is BADADABCF18C386D3E3EE2769FC1D53A
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase    : Security checking request GET /login/cas
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] org.apache.catalina.realm.RealmBase      :   No applicable constraints defined
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase    : Not subject to any constraint
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy        : Securing GET /login/cas?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:48.824 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = true
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : requiresAuthentication = true
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorConfigured = false
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorRequest = false
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = true
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters   : Set encoding to UTF-8
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters   : Decoding query null UTF-8
2023-10-26 10:38:48.825 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters   : Start processing with input [ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox]
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.c.a.CasAuthenticationProvider      : serviceUrl = http://echempad.iciq.es:8081/login/cas
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Placing URL parameters in map.
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Calling template URL attribute map.
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Loading custom parameters from configuration.
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Constructing validation url: https://echempad-cas.iciq.es:8443/cas/p3/serviceValidate?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox&service=http%3A%2F%2Fechempad.iciq.es%3A8081%2Flogin%2Fcas
2023-10-26 10:38:48.826 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Retrieving response from server.
2023-10-26 10:38:48.831 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Root Certification Authority, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:2048, Cert Id:-1642094263, Valid from:8/28/08, 9:24 AM, Valid until:12/31/30, 4:59 PM
2023-10-26 10:38:48.832 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:62f6326ce5c4e3685c1b62dd9c2e9d95, Subject:CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS, OID.2.5.4.97=VATES-Q2826004J, OU=Ceres, O=FNMT-RCM, C=ES, Issuer:CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS, OID.2.5.4.97=VATES-Q2826004J, OU=Ceres, O=FNMT-RCM, C=ES, Key type:EC, Length:384, Cert Id:246315697, Valid from:12/20/18, 10:37 AM, Valid until:12/20/43, 10:37 AM
2023-10-26 10:38:48.832 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:2646197731e14f6f2836de395186e6d4978822c1, Subject:CN=E-Tugra Global Root CA ECC v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Issuer:CN=E-Tugra Global Root CA ECC v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Key type:EC, Length:384, Cert Id:96274892, Valid from:3/18/20, 10:46 AM, Valid until:3/12/45, 10:46 AM
2023-10-26 10:38:48.833 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:7497258ac73f7a54, Subject:CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Premium ECC, O=AffirmTrust, C=US, Key type:EC, Length:384, Cert Id:-2080363786, Valid from:1/29/10, 3:20 PM, Valid until:12/31/40, 3:20 PM
2023-10-26 10:38:48.834 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:dd3e3bc6cf96bb1, Subject:CN=ANF Secure Server Root CA, OU=ANF CA Raiz, O=ANF Autoridad de Certificacion, C=ES, SERIALNUMBER=G63287510, Issuer:CN=ANF Secure Server Root CA, OU=ANF CA Raiz, O=ANF Autoridad de Certificacion, C=ES, SERIALNUMBER=G63287510, Key type:RSA, Length:4096, Cert Id:-841649695, Valid from:9/4/19, 12:00 PM, Valid until:8/30/39, 12:00 PM
2023-10-26 10:38:48.834 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:d4dc5cd16229596087eb80b7f150634fb791034, Subject:CN=E-Tugra Global Root CA RSA v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Issuer:CN=E-Tugra Global Root CA RSA v3, OU=E-Tugra Trust Center, O=E-Tugra EBG A.S., L=Ankara, C=TR, Key type:RSA, Length:4096, Cert Id:1381684375, Valid from:3/18/20, 10:07 AM, Valid until:3/12/45, 10:07 AM
2023-10-26 10:38:48.835 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:55556bcf25ea43535c3a40fd5ab4572, Subject:CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:EC, Length:384, Cert Id:-795968543, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:48.835 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:5c8b99c55a94c5d27156decd8980cc26, Subject:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:EC, Length:384, Cert Id:-965679910, Valid from:2/1/10, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:48.836 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:a0142800000014523c844b500000002, Subject:CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US, Issuer:CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US, Key type:RSA, Length:4096, Cert Id:1232565210, Valid from:1/16/14, 7:12 PM, Valid until:1/16/34, 7:12 PM
2023-10-26 10:38:48.836 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:cf08e5c0816a5ad427ff0eb271859d0, Subject:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Issuer:CN=SecureTrust CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:2034155325, Valid from:11/7/06, 8:31 PM, Valid until:12/31/29, 8:40 PM
2023-10-26 10:38:48.837 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:39ca931cef43f3c68e93c7f46489387e, Subject:CN=HARICA TLS RSA Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Issuer:CN=HARICA TLS RSA Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Key type:RSA, Length:4096, Cert Id:1709624614, Valid from:2/19/21, 11:55 AM, Valid until:2/13/45, 11:55 AM
2023-10-26 10:38:48.838 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:5ddfb1da5aa3ed5dbe5a6520650390ef, Subject:CN=UCA Global G2 Root, O=UniTrust, C=CN, Issuer:CN=UCA Global G2 Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:1844967193, Valid from:3/11/16, 1:00 AM, Valid until:12/31/40, 1:00 AM
2023-10-26 10:38:48.838 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Issuer:CN=SecureSign RootCA11, O="Japan Certification Services, Inc.", C=JP, Key type:RSA, Length:2048, Cert Id:2079057034, Valid from:4/8/09, 6:56 AM, Valid until:4/8/29, 6:56 AM
2023-10-26 10:38:48.838 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:41d29dd172eaeea780c12c6ce92f8752, Subject:CN=ISRG Root X2, O=Internet Security Research Group, C=US, Issuer:CN=ISRG Root X2, O=Internet Security Research Group, C=US, Key type:EC, Length:384, Cert Id:-896325052, Valid from:9/4/20, 2:00 AM, Valid until:9/17/40, 6:00 PM
2023-10-26 10:38:48.839 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:1, Subject:CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:RSA, Length:2048, Cert Id:-1197580894, Valid from:1/1/04, 1:00 AM, Valid until:1/1/29, 12:59 AM
2023-10-26 10:38:48.839 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:66f23daf87de8bb14aea0c573101c2ec, Subject:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft ECC Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:EC, Length:384, Cert Id:-1054206011, Valid from:12/19/19, 12:06 AM, Valid until:7/19/42, 1:16 AM
2023-10-26 10:38:48.839 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:5d938d306736c8061d1ac754846907, Subject:OU=AC RAIZ FNMT-RCM, O=FNMT-RCM, C=ES, Issuer:OU=AC RAIZ FNMT-RCM, O=FNMT-RCM, C=ES, Key type:RSA, Length:4096, Cert Id:1555523573, Valid from:10/29/08, 4:59 PM, Valid until:1/1/30, 1:00 AM
2023-10-26 10:38:48.840 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:5f0241d77a877c4c03a3ac968dfbffd0, Subject:CN=D-TRUST EV Root CA 1 2020, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST EV Root CA 1 2020, O=D-Trust GmbH, C=DE, Key type:EC, Length:384, Cert Id:238735896, Valid from:2/11/20, 11:00 AM, Valid until:2/11/35, 10:59 AM
2023-10-26 10:38:48.840 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Hellenic Academic and Research Institutions RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Issuer:CN=Hellenic Academic and Research Institutions RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Key type:RSA, Length:4096, Cert Id:-802976731, Valid from:7/7/15, 12:11 PM, Valid until:6/30/40, 12:11 PM
2023-10-26 10:38:48.841 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:8f9b478a8fa7eda6a333789de7ccf8a, Subject:CN=DigiCert TLS RSA4096 Root G5, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert TLS RSA4096 Root G5, O="DigiCert, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:165956757, Valid from:1/15/21, 1:00 AM, Valid until:1/15/46, 12:59 AM
2023-10-26 10:38:48.841 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:4fd22b8ff564c8339e4f345866237060, Subject:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Issuer:CN=UCA Extended Validation Root, O=UniTrust, C=CN, Key type:RSA, Length:4096, Cert Id:649181271, Valid from:3/13/15, 1:00 AM, Valid until:12/31/38, 1:00 AM
2023-10-26 10:38:48.841 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:d9b5437fafa9390f000000005565ad58, Subject:CN=Entrust Root Certification Authority - G4, OU="(c) 2015 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority - G4, OU="(c) 2015 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Key type:RSA, Length:4096, Cert Id:1368037548, Valid from:5/27/15, 1:11 PM, Valid until:12/27/37, 12:41 PM
2023-10-26 10:38:48.842 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:1ed397095fd8b4b347701eaabe7f45b3, Subject:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Issuer:CN=Microsoft RSA Root Certificate Authority 2017, O=Microsoft Corporation, C=US, Key type:RSA, Length:4096, Cert Id:-1446618248, Valid from:12/18/19, 11:51 PM, Valid until:7/19/42, 1:00 AM
2023-10-26 10:38:48.843 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:4e812d8a8265e00b02ee3e350246e53d, Subject:CN=COMODO Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=COMODO Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:RSA, Length:2048, Cert Id:904304908, Valid from:12/1/06, 1:00 AM, Valid until:1/1/30, 12:59 AM
2023-10-26 10:38:48.843 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:84822c5f1c62d040, Subject:CN=TrustCor ECA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Issuer:CN=TrustCor ECA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Key type:RSA, Length:2048, Cert Id:1382581529, Valid from:2/4/16, 1:32 PM, Valid until:12/31/29, 6:28 PM
2023-10-26 10:38:48.843 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:66c9fd29635869f0a0fe58678f85b26bb8a37, Subject:CN=Amazon Root CA 2, O=Amazon, C=US, Issuer:CN=Amazon Root CA 2, O=Amazon, C=US, Key type:RSA, Length:4096, Cert Id:-1766132388, Valid from:5/26/15, 2:00 AM, Valid until:5/26/40, 2:00 AM
2023-10-26 10:38:48.844 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:212a560caeda0cab4045bf2ba22d3aea, Subject:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GC CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:EC, Length:384, Cert Id:-1513165457, Valid from:5/9/17, 11:48 AM, Valid until:5/9/42, 11:58 AM
2023-10-26 10:38:48.844 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:4f1bd42f54bb2f4b, Subject:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:126726124, Valid from:10/25/06, 10:32 AM, Valid until:10/25/36, 10:32 AM
2023-10-26 10:38:48.844 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:66c9fd7c1bb104c2943e5717b7b2cc81ac10e, Subject:CN=Amazon Root CA 4, O=Amazon, C=US, Issuer:CN=Amazon Root CA 4, O=Amazon, C=US, Key type:EC, Length:384, Cert Id:-1654272513, Valid from:5/26/15, 2:00 AM, Valid until:5/26/40, 2:00 AM
2023-10-26 10:38:48.845 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:5c33cb622c5fb332, Subject:C=DE, O=Atos, CN=Atos TrustedRoot 2011, Issuer:C=DE, O=Atos, CN=Atos TrustedRoot 2011, Key type:RSA, Length:2048, Cert Id:-28528624, Valid from:7/7/11, 4:58 PM, Valid until:1/1/31, 12:59 AM
2023-10-26 10:38:48.845 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:7b2c9bd316803299, Subject:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:156725711, Valid from:2/12/16, 6:39 PM, Valid until:2/12/41, 6:39 PM
2023-10-26 10:38:48.846 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:1302d5e2404c92468616675db4bbbbb26b3efc13, Subject:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Issuer:CN=TunTrust Root CA, O=Agence Nationale de Certification Electronique, C=TN, Key type:RSA, Length:4096, Cert Id:1973181427, Valid from:4/26/19, 10:57 AM, Valid until:4/26/44, 10:57 AM
2023-10-26 10:38:48.857 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withECDSA, Serial:2c299c5b16ed0595, Subject:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:1789254518, Valid from:2/12/16, 7:15 PM, Valid until:2/12/41, 7:15 PM
2023-10-26 10:38:48.858 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US, Issuer:OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:-271444299, Valid from:6/29/04, 7:06 PM, Valid until:6/29/34, 7:06 PM
2023-10-26 10:38:48.858 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:62533b1470333275cf98d9ab9bfccf8, Subject:CN=Certainly Root E1, O=Certainly, C=US, Issuer:CN=Certainly Root E1, O=Certainly, C=US, Key type:EC, Length:384, Cert Id:792571453, Valid from:4/1/21, 2:00 AM, Valid until:4/1/46, 2:00 AM
2023-10-26 10:38:48.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:-1026641587, Valid from:9/1/09, 2:00 AM, Valid until:1/1/38, 12:59 AM
2023-10-26 10:38:48.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:b0b75a16485fbfe1cbf58bd719e67d, Subject:CN=Izenpe.com, O=IZENPE S.A., C=ES, Issuer:CN=Izenpe.com, O=IZENPE S.A., C=ES, Key type:RSA, Length:4096, Cert Id:-1845580984, Valid from:12/13/07, 2:08 PM, Valid until:12/13/37, 9:27 AM
2023-10-26 10:38:48.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:605949e0262ebb55f90a778a71f94ad86c, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5, Key type:EC, Length:384, Cert Id:1997048439, Valid from:11/13/12, 1:00 AM, Valid until:1/19/38, 4:14 AM
2023-10-26 10:38:48.860 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withECDSA, Serial:203e57ef53f93fda50921b2a6, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4, Key type:EC, Length:256, Cert Id:-516970517, Valid from:11/13/12, 1:00 AM, Valid until:1/19/38, 4:14 AM
2023-10-26 10:38:48.860 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA512withRSA, Serial:1ebf5950b8c980374c06f7eb554fb5ed, Subject:CN=Certum Trusted Root CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Issuer:CN=Certum Trusted Root CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Key type:RSA, Length:4096, Cert Id:-774327051, Valid from:3/16/18, 1:10 PM, Valid until:3/16/43, 1:10 PM
2023-10-26 10:38:48.860 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:75622a4e8d48a894df413c8f0f8eaa5, Subject:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Issuer:CN=Secure Global CA, O=SecureTrust Corporation, C=US, Key type:RSA, Length:2048, Cert Id:-1476772975, Valid from:11/7/06, 8:42 PM, Valid until:12/31/29, 8:52 PM
2023-10-26 10:38:48.907 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:49412ce40010, Subject:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Issuer:CN=NetLock Arany (Class Gold) Főtanúsítvány, OU=Tanúsítványkiadók (Certification Services), O=NetLock Kft., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:58541246, Valid from:12/11/08, 4:08 PM, Valid until:12/6/28, 4:08 PM
2023-10-26 10:38:48.908 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:570a119742c4e3cc, Subject:CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT, Issuer:CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, L=Milan, C=IT, Key type:RSA, Length:4096, Cert Id:1729119956, Valid from:9/22/11, 1:22 PM, Valid until:9/22/30, 1:22 PM
2023-10-26 10:38:48.908 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:e17c3740fd1bfe67, Subject:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication RootCA3, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:4096, Cert Id:-490273538, Valid from:6/16/16, 8:17 AM, Valid until:1/18/38, 7:17 AM
2023-10-26 10:38:48.909 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:110034b64ec6362d36, Subject:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Issuer:OU=certSIGN ROOT CA G2, O=CERTSIGN SA, C=RO, Key type:RSA, Length:4096, Cert Id:-2113880430, Valid from:2/6/17, 10:27 AM, Valid until:2/6/42, 10:27 AM
2023-10-26 10:38:48.909 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:3e8a5d07ec55d232d5b7e3b65f01eb2ddce4d6e4, Subject:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Issuer:CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL, Key type:RSA, Length:2048, Cert Id:381279303, Valid from:10/19/15, 9:43 AM, Valid until:10/19/35, 9:43 AM
2023-10-26 10:38:48.910 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:8bd85976c9927a48068473b, Subject:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P384 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:384, Cert Id:-1993924923, Valid from:8/23/17, 9:36 PM, Valid until:8/23/42, 9:36 PM
2023-10-26 10:38:48.920 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:11d2bbb9d723189e405f0a9d2dd0df2567d1, Subject:CN=GlobalSign Root R46, O=GlobalSign nv-sa, C=BE, Issuer:CN=GlobalSign Root R46, O=GlobalSign nv-sa, C=BE, Key type:RSA, Length:4096, Cert Id:1275948927, Valid from:3/20/19, 1:00 AM, Valid until:3/20/46, 1:00 AM
2023-10-26 10:38:48.920 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:4a538c28, Subject:CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority - G2, OU="(c) 2009 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:1936920337, Valid from:7/7/09, 7:25 PM, Valid until:12/7/30, 6:55 PM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:184accd6, Subject:CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN, Issuer:CN=CFCA EV ROOT, O=China Financial Certification Authority, C=CN, Key type:RSA, Length:4096, Cert Id:551407782, Valid from:8/8/12, 5:07 AM, Valid until:12/31/29, 4:07 AM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:7b71b68256b8127c9ca8, Subject:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign ECC Root CA - C3, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:EC, Length:384, Cert Id:-948456756, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP, Issuer:OU=Security Communication RootCA1, O=SECOM Trust.net, C=JP, Key type:RSA, Length:2048, Cert Id:1802358121, Valid from:9/30/03, 6:20 AM, Valid until:9/30/23, 6:20 AM
2023-10-26 10:38:48.921 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:3cf607a968700eda8b84, Subject:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign ECC Root CA - G3, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:EC, Length:384, Cert Id:-462931589, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:48.922 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:2, Subject:CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO, Issuer:CN=Buypass Class 3 Root CA, O=Buypass AS-983163327, C=NO, Key type:RSA, Length:4096, Cert Id:1264269967, Valid from:10/26/10, 10:28 AM, Valid until:10/26/40, 10:28 AM
2023-10-26 10:38:48.922 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withECDSA, Serial:d6a5f083f285c3e5195df5d, Subject:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global ECC P256 Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:EC, Length:256, Cert Id:948272517, Valid from:8/23/17, 9:35 PM, Valid until:8/23/42, 9:35 PM
2023-10-26 10:38:48.922 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:7c4f04391cd4992d, Subject:CN=AffirmTrust Networking, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Networking, O=AffirmTrust, C=US, Key type:RSA, Length:2048, Cert Id:651670175, Valid from:1/29/10, 3:08 PM, Valid until:12/31/30, 3:08 PM
2023-10-26 10:38:49.195 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:fedce3010fc948ff, Subject:CN=Certigna, O=Dhimyotis, C=FR, Issuer:CN=Certigna, O=Dhimyotis, C=FR, Key type:RSA, Length:2048, Cert Id:-788091456, Valid from:6/29/07, 5:13 PM, Valid until:6/29/27, 5:13 PM
2023-10-26 10:38:49.196 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Issuer:CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1, OU=Kamu Sertifikasyon Merkezi - Kamu SM, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, L=Gebze - Kocaeli, C=TR, Key type:RSA, Length:2048, Cert Id:1093603654, Valid from:11/25/13, 9:25 AM, Valid until:10/25/43, 9:25 AM
2023-10-26 10:38:49.196 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:200605167002, Subject:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Issuer:OU=certSIGN ROOT CA, O=certSIGN, C=RO, Key type:RSA, Length:2048, Cert Id:-289960676, Valid from:7/4/06, 7:20 PM, Valid until:7/4/31, 7:20 PM
2023-10-26 10:38:49.196 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:78585f2ead2c194be3370735341328b596d46593, Subject:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:-762436034, Valid from:1/12/12, 6:27 PM, Valid until:1/12/42, 6:27 PM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:203e5c068ef631a9c72905052, Subject:CN=GTS Root R4, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R4, O=Google Trust Services LLC, C=US, Key type:EC, Length:384, Cert Id:1326433111, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:a68b79290000000050d091f9, Subject:CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 Entrust, Inc. - for authorized use only", OU=See www.entrust.net/legal-terms, O="Entrust, Inc.", C=US, Key type:EC, Length:384, Cert Id:924514073, Valid from:12/18/12, 4:25 PM, Valid until:12/18/37, 4:55 PM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:20000b9, Subject:CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE, Issuer:CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE, Key type:RSA, Length:2048, Cert Id:1425294543, Valid from:5/12/00, 8:46 PM, Valid until:5/13/25, 1:59 AM
2023-10-26 10:38:49.197 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:5a4bbd5afb4f8a5bfa65e5, Subject:CN=GLOBALTRUST 2020, O=e-commerce monitoring GmbH, C=AT, Issuer:CN=GLOBALTRUST 2020, O=e-commerce monitoring GmbH, C=AT, Key type:RSA, Length:4096, Cert Id:-522246883, Valid from:2/10/20, 1:00 AM, Valid until:6/10/40, 2:00 AM
2023-10-26 10:38:49.198 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:3863def8, Subject:CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net, Issuer:CN=Entrust.net Certification Authority (2048), OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), O=Entrust.net, Key type:RSA, Length:2048, Cert Id:-328536082, Valid from:12/24/99, 6:50 PM, Valid until:7/24/29, 4:15 PM
2023-10-26 10:38:49.198 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:788f275c81125220a504d02dddba73f4, Subject:CN=Certum EC-384 CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Issuer:CN=Certum EC-384 CA, OU=Certum Certification Authority, O=Asseco Data Systems S.A., C=PL, Key type:EC, Length:384, Cert Id:994586241, Valid from:3/26/18, 9:24 AM, Valid until:3/26/43, 8:24 AM
2023-10-26 10:38:49.198 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:15c8bd65475cafb897005ee406d2bc9d, Subject:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Issuer:OU=ePKI Root Certification Authority, O="Chunghwa Telecom Co., Ltd.", C=TW, Key type:RSA, Length:4096, Cert Id:-662636137, Valid from:12/20/04, 3:31 AM, Valid until:12/20/34, 3:31 AM
2023-10-26 10:38:49.199 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:0, Subject:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Issuer:OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:1825617644, Valid from:6/29/04, 7:39 PM, Valid until:6/29/34, 7:39 PM
2023-10-26 10:38:49.199 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:ce7e0e517d846fe8fe560fc1bf03039, Subject:CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:-860404528, Valid from:11/10/06, 1:00 AM, Valid until:11/10/31, 1:00 AM
2023-10-26 10:38:49.728 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:203e5b882eb20f825276d3d66, Subject:CN=GTS Root R3, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R3, O=Google Trust Services LLC, C=US, Key type:EC, Length:384, Cert Id:1163081155, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:49.729 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:-1238464039, Valid from:10/1/08, 12:40 PM, Valid until:10/2/33, 1:59 AM
2023-10-26 10:38:49.729 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:50946cec18ead59c4dd597ef758fa0ad, Subject:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Issuer:CN=XRamp Global Certification Authority, O=XRamp Security Services Inc, OU=www.xrampsecurity.com, C=US, Key type:RSA, Length:2048, Cert Id:-952474086, Valid from:11/1/04, 6:14 PM, Valid until:1/1/35, 6:37 AM
2023-10-26 10:38:49.729 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:5ec3b7a6437fa4e0, Subject:C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1, Issuer:C=ES, O=ACCV, OU=PKIACCV, CN=ACCVRAIZ1, Key type:RSA, Length:4096, Cert Id:-592111236, Valid from:5/5/11, 11:37 AM, Valid until:12/31/30, 10:37 AM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:d65d9bb378812eeb, Subject:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:CN=Security Communication ECC RootCA1, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:EC, Length:384, Cert Id:2131361491, Valid from:6/16/16, 7:15 AM, Valid until:1/18/38, 6:15 AM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:5c6, Subject:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:1470392860, Valid from:11/24/06, 8:11 PM, Valid until:11/24/31, 8:06 PM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:3e8, Subject:CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK, Issuer:CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK, Key type:RSA, Length:2048, Cert Id:-1426826250, Valid from:5/15/03, 7:13 AM, Valid until:5/15/23, 6:52 AM
2023-10-26 10:38:49.730 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:8165f8a4ca5ec00c99340dfc4c6ae23b81c5aa4, Subject:CN=Hongkong Post Root CA 3, O=Hongkong Post, L=Hong Kong, ST=Hong Kong, C=HK, Issuer:CN=Hongkong Post Root CA 3, O=Hongkong Post, L=Hong Kong, ST=Hong Kong, C=HK, Key type:RSA, Length:4096, Cert Id:-901951080, Valid from:6/3/17, 4:29 AM, Valid until:6/3/42, 4:29 AM
2023-10-26 10:38:49.731 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:cbe, Subject:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Issuer:CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW, Key type:RSA, Length:4096, Cert Id:861175838, Valid from:6/27/12, 8:28 AM, Valid until:12/31/30, 4:59 PM
2023-10-26 10:38:49.731 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:6e6abc59aa53be983967a2d26ba43be66d1cd6da, Subject:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus ECC Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:EC, Length:384, Cert Id:268503342, Valid from:7/31/18, 9:26 AM, Valid until:7/31/43, 9:26 AM
2023-10-26 10:38:49.731 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:da9bec71f303b019, Subject:CN=TrustCor RootCert CA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Issuer:CN=TrustCor RootCert CA-1, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Key type:RSA, Length:2048, Cert Id:1332877130, Valid from:2/4/16, 1:32 PM, Valid until:12/31/29, 6:23 PM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:439600313, Valid from:9/1/09, 2:00 AM, Valid until:1/1/38, 12:59 AM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:5f70e86da49f346352ebab2, Subject:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Issuer:CN=Trustwave Global Certification Authority, O="Trustwave Holdings, Inc.", L=Chicago, ST=Illinois, C=US, Key type:RSA, Length:4096, Cert Id:416366836, Valid from:8/23/17, 9:34 PM, Valid until:8/23/42, 9:34 PM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:b931c3ad63967ea6723bfc3af9af44b, Subject:CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Assured ID Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:-385398383, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:49.732 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Issuer:OU=Security Communication RootCA2, O="SECOM Trust Systems CO.,LTD.", C=JP, Key type:RSA, Length:2048, Cert Id:1521072570, Valid from:5/29/09, 7:00 AM, Valid until:5/29/29, 7:00 AM
2023-10-26 10:38:49.933 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:40000000001154b5ac394, Subject:CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE, Issuer:CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE, Key type:RSA, Length:2048, Cert Id:536948034, Valid from:9/1/98, 2:00 PM, Valid until:1/28/28, 1:00 PM
2023-10-26 10:38:49.933 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:cae91b89f155030da3e6416dc4e3a6e1, Subject:CN=Certigna Root CA, OU=0002 48146308100036, O=Dhimyotis, C=FR, Issuer:CN=Certigna Root CA, OU=0002 48146308100036, O=Dhimyotis, C=FR, Key type:RSA, Length:4096, Cert Id:356684591, Valid from:10/1/13, 10:32 AM, Valid until:10/1/33, 10:32 AM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:983f3, Subject:CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:1430153102, Valid from:11/5/09, 9:35 AM, Valid until:11/5/29, 9:35 AM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:1675f27d6fe7ae3e4acbe095b059e, Subject:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Issuer:CN=Telia Root CA v2, O=Telia Finland Oyj, C=FI, Key type:RSA, Length:4096, Cert Id:-821903320, Valid from:11/29/18, 12:55 PM, Valid until:11/29/43, 12:55 PM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:c27e43044e473f19, Subject:EMAILADDRESS=in...@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Issuer:EMAILADDRESS=in...@e-szigno.hu, CN=Microsec e-Szigno Root CA 2009, O=Microsec Ltd., L=Budapest, C=HU, Key type:RSA, Length:2048, Cert Id:-1903950012, Valid from:6/16/09, 1:30 PM, Valid until:12/30/29, 12:30 PM
2023-10-26 10:38:49.934 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:31f5e4620c6c58edd6d8, Subject:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Issuer:CN=emSign Root CA - G1, O=eMudhra Technologies Limited, OU=emSign PKI, C=IN, Key type:RSA, Length:2048, Cert Id:392709196, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:445734245b81899b35f2ceb82b3b5ba726f07528, Subject:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:696763521, Valid from:1/12/12, 7:59 PM, Valid until:1/12/42, 7:59 PM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:bb401c43f55e4fb0, Subject:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Issuer:CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH, Key type:RSA, Length:4096, Cert Id:1516221943, Valid from:10/25/06, 10:30 AM, Valid until:10/25/36, 10:30 AM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:2c17087d642ac0fe85185906cfb44aeb, Subject:CN=BJCA Global Root CA2, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Issuer:CN=BJCA Global Root CA2, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Key type:EC, Length:384, Cert Id:1781225575, Valid from:12/19/19, 4:18 AM, Valid until:12/12/44, 4:18 AM
2023-10-26 10:38:49.935 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:66c9fcf99bf8c0a39e2f0788a43e696365bca, Subject:CN=Amazon Root CA 1, O=Amazon, C=US, Issuer:CN=Amazon Root CA 1, O=Amazon, C=US, Key type:RSA, Length:2048, Cert Id:-1472444962, Valid from:5/26/15, 2:00 AM, Valid until:1/17/38, 1:00 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:0, Subject:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Issuer:CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US, Key type:RSA, Length:2048, Cert Id:1964785574, Valid from:9/1/09, 2:00 AM, Valid until:1/1/38, 12:59 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:43e37113d8b359145db7ce8cfd35fd6fbc058d45, Subject:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Issuer:CN=vTrus Root CA, O="iTrusChina Co.,Ltd.", C=CN, Key type:RSA, Length:4096, Cert Id:-1825883750, Valid from:7/31/18, 9:24 AM, Valid until:7/31/43, 9:24 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:203e5aec58d04251aab1125aa, Subject:CN=GTS Root R2, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R2, O=Google Trust Services LLC, C=US, Key type:RSA, Length:4096, Cert Id:948387669, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:49.936 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:92b888dbb08ac163, Subject:CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK, Issuer:CN=CA Disig Root R2, O=Disig a.s., L=Bratislava, C=SK, Key type:RSA, Length:4096, Cert Id:747175721, Valid from:7/19/12, 11:15 AM, Valid until:7/19/42, 11:15 AM
2023-10-26 10:38:49.937 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:444c0, Subject:CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Issuer:CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Key type:RSA, Length:2048, Cert Id:2014002193, Valid from:10/22/08, 2:07 PM, Valid until:12/31/29, 1:07 PM
2023-10-26 10:38:49.937 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:4caaf9cadb636fe01ff74ed85b03869d, Subject:CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:RSA, Length:4096, Cert Id:1769425049, Valid from:1/19/10, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:49.937 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:76b1205274f0858746b3f8231af6c2c0, Subject:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Issuer:CN=OISTE WISeKey Global Root GB CA, OU=OISTE Foundation Endorsed, O=WISeKey, C=CH, Key type:RSA, Length:2048, Cert Id:-613481516, Valid from:12/1/14, 4:00 PM, Valid until:12/1/39, 4:10 PM
2023-10-26 10:38:50.106 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:9e09365acf7d9c8b93e1c0b042a2ef3, Subject:CN=DigiCert TLS ECC P384 Root G5, O="DigiCert, Inc.", C=US, Issuer:CN=DigiCert TLS ECC P384 Root G5, O="DigiCert, Inc.", C=US, Key type:EC, Length:384, Cert Id:-354195278, Valid from:1/15/21, 1:00 AM, Valid until:1/15/46, 12:59 AM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:7777062726a9b17c, Subject:CN=AffirmTrust Commercial, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Commercial, O=AffirmTrust, C=US, Key type:RSA, Length:2048, Cert Id:630485644, Valid from:1/29/10, 3:06 PM, Valid until:12/31/30, 3:06 PM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:1f47afaa62007050544c019e9b63992a, Subject:CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Issuer:CN=COMODO ECC Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, Key type:EC, Length:384, Cert Id:1146488932, Valid from:3/6/08, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:2ac5c266a0b409b8f0b79f2ae462577, Subject:CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:-1410680354, Valid from:11/10/06, 1:00 AM, Valid until:11/10/31, 1:00 AM
2023-10-26 10:38:50.107 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withECDSA, Serial:66c9fd5749736663f3b0b9ad9e89e7603f24a, Subject:CN=Amazon Root CA 3, O=Amazon, C=US, Issuer:CN=Amazon Root CA 3, O=Amazon, C=US, Key type:EC, Length:256, Cert Id:-1562287523, Valid from:5/26/15, 2:00 AM, Valid until:5/26/40, 2:00 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:2, Subject:CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO, Issuer:CN=Buypass Class 2 Root CA, O=Buypass AS-983163327, C=NO, Key type:RSA, Length:4096, Cert Id:969960563, Valid from:10/26/10, 10:38 AM, Valid until:10/26/40, 10:38 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:45e6bb038333c3856548e6ff4551, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6, Key type:RSA, Length:4096, Cert Id:-506627753, Valid from:12/10/14, 1:00 AM, Valid until:12/10/34, 1:00 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:11d2bbba336ed4bce62468c50d841d98e843, Subject:CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE, Issuer:CN=GlobalSign Root E46, O=GlobalSign nv-sa, C=BE, Key type:EC, Length:384, Cert Id:-889363391, Valid from:3/20/19, 1:00 AM, Valid until:3/20/46, 1:00 AM
2023-10-26 10:38:50.108 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:203e5936f31b01349886ba217, Subject:CN=GTS Root R1, O=Google Trust Services LLC, C=US, Issuer:CN=GTS Root R1, O=Google Trust Services LLC, C=US, Key type:RSA, Length:4096, Cert Id:657172038, Valid from:6/22/16, 2:00 AM, Valid until:6/22/36, 2:00 AM
2023-10-26 10:38:50.394 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:4000000000121585308a2, Subject:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3, Issuer:CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3, Key type:RSA, Length:2048, Cert Id:733875591, Valid from:3/18/09, 11:00 AM, Valid until:3/18/29, 11:00 AM
2023-10-26 10:38:50.394 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:ba15afa1ddfa0b54944afcd24a06cec, Subject:CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Assured ID Root G3, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:EC, Length:384, Cert Id:-645537245, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:50.394 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:6a683e9c519bcb53, Subject:CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR, Issuer:CN=E-Tugra Certification Authority, OU=E-Tugra Sertifikasyon Merkezi, O=E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş., L=Ankara, C=TR, Key type:RSA, Length:4096, Cert Id:-673382379, Valid from:3/5/13, 1:09 PM, Valid until:3/3/23, 1:09 PM
2023-10-26 10:38:50.395 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:25a1dfca33cb5902, Subject:CN=TrustCor RootCert CA-2, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Issuer:CN=TrustCor RootCert CA-2, OU=TrustCor Certificate Authority, O=TrustCor Systems S. de R.L., L=Panama City, ST=Panama, C=PA, Key type:RSA, Length:4096, Cert Id:1646661199, Valid from:2/4/16, 1:32 PM, Valid until:12/31/34, 6:26 PM
2023-10-26 10:38:50.395 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:6d8c1446b1a60aee, Subject:CN=AffirmTrust Premium, O=AffirmTrust, C=US, Issuer:CN=AffirmTrust Premium, O=AffirmTrust, C=US, Key type:RSA, Length:4096, Cert Id:-2130283955, Valid from:1/29/10, 3:10 PM, Valid until:12/31/40, 3:10 PM
2023-10-26 10:38:50.395 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withECDSA, Serial:75e6dfcbc1685ba8, Subject:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com Root Certification Authority ECC, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:EC, Length:384, Cert Id:-1368293613, Valid from:2/12/16, 7:14 PM, Valid until:2/12/41, 7:14 PM
2023-10-26 10:38:50.396 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:1b70e9d2ffae6c71, Subject:CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES, Issuer:CN=Autoridad de Certificacion Firmaprofesional CIF A62634068, C=ES, Key type:RSA, Length:4096, Cert Id:-1766730314, Valid from:9/23/14, 5:22 PM, Valid until:5/5/36, 5:22 PM
2023-10-26 10:38:50.396 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:59b1b579e8e2132e23907bda777755c, Subject:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:4096, Cert Id:1057369358, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:50.397 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:67749d8d77d83b6adb22f4ff59e2bfce, Subject:CN=HARICA TLS ECC Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Issuer:CN=HARICA TLS ECC Root CA 2021, O=Hellenic Academic and Research Institutions CA, C=GR, Key type:EC, Length:384, Cert Id:-693932344, Valid from:2/19/21, 12:01 PM, Valid until:2/13/45, 12:01 PM
2023-10-26 10:38:50.397 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:556f65e3b4d9906a1b09d16c3ec06c20, Subject:CN=BJCA Global Root CA1, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Issuer:CN=BJCA Global Root CA1, O=BEIJING CERTIFICATE AUTHORITY, C=CN, Key type:RSA, Length:4096, Cert Id:-1889263367, Valid from:12/19/19, 4:16 AM, Valid until:12/12/44, 4:16 AM
2023-10-26 10:38:50.397 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:983f4, Subject:CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST Root Class 3 CA 2 EV 2009, O=D-Trust GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:971313728, Valid from:11/5/09, 9:50 AM, Valid until:11/5/29, 9:50 AM
2023-10-26 10:38:50.398 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withECDSA, Serial:0, Subject:CN=Hellenic Academic and Research Institutions ECC RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Issuer:CN=Hellenic Academic and Research Institutions ECC RootCA 2015, O=Hellenic Academic and Research Institutions Cert. Authority, L=Athens, C=GR, Key type:EC, Length:384, Cert Id:513613456, Valid from:7/7/15, 12:37 PM, Valid until:6/30/40, 12:37 PM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:33af1e6a711a9a0bb2864b11d09fae5, Subject:CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:1136084297, Valid from:8/1/13, 2:00 PM, Valid until:1/15/38, 1:00 PM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:1, Subject:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Issuer:CN=T-TeleSec GlobalRoot Class 3, OU=T-Systems Trust Center, O=T-Systems Enterprise Services GmbH, C=DE, Key type:RSA, Length:2048, Cert Id:1894096264, Valid from:10/1/08, 12:29 PM, Valid until:10/2/33, 1:59 AM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:2ef59b0228a7db7affd5a3a9eebd03a0cf126a1d, Subject:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 3 G3, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:-705622991, Valid from:1/12/12, 9:26 PM, Valid until:1/12/42, 9:26 PM
2023-10-26 10:38:50.399 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:2dddacce629794a143e8b0cd766a5e60, Subject:CN=HiPKI Root CA - G1, O="Chunghwa Telecom Co., Ltd.", C=TW, Issuer:CN=HiPKI Root CA - G1, O="Chunghwa Telecom Co., Ltd.", C=TW, Key type:RSA, Length:4096, Cert Id:-2016358144, Valid from:2/22/19, 10:46 AM, Valid until:12/31/37, 4:59 PM
2023-10-26 10:38:50.676 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Pool stats (total=10, active=0, idle=10, waiting=0)
2023-10-26 10:38:50.780 DEBUG 36220 --- [l-1 housekeeper] com.zaxxer.hikari.pool.HikariPool        : HikariPool-1 - Fill pool skipped, pool is at sufficient level.
2023-10-26 10:38:50.781 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:509, Subject:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Issuer:CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM, Key type:RSA, Length:4096, Cert Id:338250116, Valid from:11/24/06, 7:27 PM, Valid until:11/24/31, 7:23 PM
2023-10-26 10:38:50.781 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withECDSA, Serial:15448ef21fd97590df5040a, Subject:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Issuer:CN=e-Szigno Root CA 2017, OID.2.5.4.97=VATHU-23584497, O=Microsec Ltd., L=Budapest, C=HU, Key type:EC, Length:256, Cert Id:-991173715, Valid from:8/22/17, 2:07 PM, Valid until:8/22/42, 2:07 PM
2023-10-26 10:38:50.781 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:83be056904246b1a1756ac95991c74a, Subject:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Issuer:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US, Key type:RSA, Length:2048, Cert Id:1341898239, Valid from:11/10/06, 1:00 AM, Valid until:11/10/31, 1:00 AM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA512withRSA, Serial:21d6d04a4f250fc93237fcaa5e128de9, Subject:CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Issuer:CN=Certum Trusted Network CA 2, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL, Key type:RSA, Length:4096, Cert Id:1983350452, Valid from:10/6/11, 10:39 AM, Valid until:10/6/46, 10:39 AM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:aecf00bac4cf32f843b2, Subject:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Issuer:CN=emSign Root CA - C1, O=eMudhra Inc, OU=emSign PKI, C=US, Key type:RSA, Length:2048, Cert Id:-1268863356, Valid from:2/18/18, 7:30 PM, Valid until:2/18/43, 7:30 PM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:194301ea20bddf5c5332ab1434471f8d6504d0d, Subject:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Issuer:CN=NAVER Global Root Certification Authority, O=NAVER BUSINESS PLATFORM Corp., C=KR, Key type:RSA, Length:4096, Cert Id:1777546867, Valid from:8/18/17, 10:58 AM, Valid until:8/19/37, 1:59 AM
2023-10-26 10:38:50.782 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withRSA, Serial:1fd6d30fca3ca51a81bbc640e35032d, Subject:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Issuer:CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US, Key type:RSA, Length:4096, Cert Id:-347365895, Valid from:2/1/10, 1:00 AM, Valid until:1/19/38, 12:59 AM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA384withECDSA, Serial:7cc98f2b84d7dfea0fc9659ad34b4d96, Subject:CN=D-TRUST BR Root CA 1 2020, O=D-Trust GmbH, C=DE, Issuer:CN=D-TRUST BR Root CA 1 2020, O=D-Trust GmbH, C=DE, Key type:EC, Length:384, Cert Id:-83817738, Valid from:2/11/20, 10:45 AM, Valid until:2/11/35, 10:44 AM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:8e0ff94b907168653354f4d44439b7e0, Subject:CN=Certainly Root R1, O=Certainly, C=US, Issuer:CN=Certainly Root R1, O=Certainly, C=US, Key type:RSA, Length:4096, Cert Id:-2039008761, Valid from:4/1/21, 2:00 AM, Valid until:4/1/46, 2:00 AM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:8210cfb0d240e3594463e0bb63828b00, Subject:CN=ISRG Root X1, O=Internet Security Research Group, C=US, Issuer:CN=ISRG Root X1, O=Internet Security Research Group, C=US, Key type:RSA, Length:4096, Cert Id:1521974916, Valid from:6/4/15, 1:04 PM, Valid until:6/4/35, 1:04 PM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:95be16a0f72e46f17b398272fa8bcd96, Subject:CN=TeliaSonera Root CA v1, O=TeliaSonera, Issuer:CN=TeliaSonera Root CA v1, O=TeliaSonera, Key type:RSA, Length:4096, Cert Id:1495358374, Valid from:10/18/07, 2:00 PM, Valid until:10/18/32, 2:00 PM
2023-10-26 10:38:50.783 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:7d0997fef047ea7a, Subject:CN=GDCA TrustAUTH R5 ROOT, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", C=CN, Issuer:CN=GDCA TrustAUTH R5 ROOT, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", C=CN, Key type:RSA, Length:4096, Cert Id:494136981, Valid from:11/26/14, 6:13 AM, Valid until:12/31/40, 4:59 PM
2023-10-26 10:38:50.784 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA1withRSA, Serial:456b5054, Subject:CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US, Issuer:CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, O="Entrust, Inc.", C=US, Key type:RSA, Length:2048, Cert Id:-1261404096, Valid from:11/27/06, 9:23 PM, Valid until:11/27/26, 9:53 PM
2023-10-26 10:38:50.784 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:a0142800000014523cf467c00000002, Subject:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Issuer:CN=IdenTrust Public Sector Root CA 1, O=IdenTrust, C=US, Key type:RSA, Length:4096, Cert Id:2123370772, Valid from:1/16/14, 6:53 PM, Valid until:1/16/34, 6:53 PM
2023-10-26 10:38:50.859 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:56b629cd34bc78f6, Subject:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Issuer:CN=SSL.com EV Root Certification Authority RSA R2, O=SSL Corporation, L=Houston, ST=Texas, C=US, Key type:RSA, Length:4096, Cert Id:1381862403, Valid from:5/31/17, 8:14 PM, Valid until:5/30/42, 8:14 PM
2023-10-26 10:38:50.915 DEBUG 36220 --- [nio-8081-exec-2] jdk.event.security                       : X509Certificate: Alg:SHA256withRSA, Serial:521be50a, Subject:CN=cas.example.org, OU=Example, OU=Org, C=US, Issuer:CN=cas.example.org, OU=Example, OU=Org, C=US, Key type:RSA, Length:2048, Cert Id:-752812843, Valid from:9/25/23, 3:22 PM, Valid until:12/24/23, 2:22 PM
2023-10-26 10:38:50.941 ERROR 36220 --- [nio-8081-exec-2] org.jasig.cas.client.util.CommonUtils    : SSL error getting response from host: echempad-cas.iciq.es : Error Message: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
        at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
        at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
        at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
        at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
        at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
        ... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
        at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
        ... 82 common frames omitted

2023-10-26 10:38:50.996 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:50.996 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:51.218 ERROR 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet]    : Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception

java.lang.RuntimeException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:463) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
        at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
        at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
        at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
        at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
        ... 59 common frames omitted
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
        at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
        ... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
        at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
        ... 82 common frames omitted

2023-10-26 10:38:51.479 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[Tomcat].[localhost]           : Processing ErrorPage[errorCode=0, location=/error]
2023-10-26 10:38:51.481 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy        : Securing GET /error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox
2023-10-26 10:38:51.482 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:51.482 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorConfigured = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorRequest = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyTicketRequest = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : requiresAuthentication = false
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.AnonymousAuthenticationFilter  : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.session.SessionManagementFilter  : Request requested invalid session id BADADABCF18C386D3E3EE2769FC1D53A
2023-10-26 10:38:51.483 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.u.matcher.RegexRequestMatcher    : Checking match of request : '/error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:51.485 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:51.485 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:51.486 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.068 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.069 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.069 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.070 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.070 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.072 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.i.FilterSecurityInterceptor    : Failed to authorize filter invocation [GET /error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox] with attributes [authenticated]
2023-10-26 10:38:52.073 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.s.HttpSessionRequestCache        : Saved request http://echempad.iciq.es:8081/error?ticket=ST-1-Tmg69cHif-DZXBS3f65t0nXXq9o-aleixmt-VirtualBox to session
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:52.074 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet]    :  Disabling the response for further output
2023-10-26 10:38:52.075 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:52.194 DEBUG 36220 --- [nio-8081-exec-2] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:52.194 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:52.194 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer      : Received [GET /login/cas?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E

]
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.t.util.http.Rfc6265CookieProcessor   : Cookies: Parsing b[]: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.catalina.connector.CoyoteAdapter     :  Requested cookie session id is 2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase    : Security checking request GET /login/cas
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] org.apache.catalina.realm.RealmBase      :   No applicable constraints defined
2023-10-26 10:38:52.195 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.authenticator.AuthenticatorBase    : Not subject to any constraint
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy        : Securing GET /login/cas?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = true
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : requiresAuthentication = true
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorConfigured = false
2023-10-26 10:38:52.196 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorRequest = false
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = true
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters   : Set encoding to UTF-8
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters   : Decoding query null UTF-8
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.http.Parameters   : Start processing with input [ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox]
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.c.a.CasAuthenticationProvider      : serviceUrl = http://echempad.iciq.es:8081/login/cas
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Placing URL parameters in map.
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Calling template URL attribute map.
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Loading custom parameters from configuration.
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Constructing validation url: https://echempad-cas.iciq.es:8443/cas/p3/serviceValidate?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox&service=http%3A%2F%2Fechempad.iciq.es%3A8081%2Flogin%2Fcas
2023-10-26 10:38:52.209 DEBUG 36220 --- [nio-8081-exec-2] o.j.c.c.v.Cas30ServiceTicketValidator    : Retrieving response from server.
2023-10-26 10:38:52.236 ERROR 36220 --- [nio-8081-exec-2] org.jasig.cas.client.util.CommonUtils    : SSL error getting response from host: echempad-cas.iciq.es : Error Message: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
        at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
        at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
        at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
        at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
        at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
        ... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
        at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
        ... 82 common frames omitted

2023-10-26 10:38:52.611 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:52.611 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:52.612 ERROR 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet]    : Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception

java.lang.RuntimeException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:463) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
        at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
        at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
        at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
        at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
        ... 59 common frames omitted
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
        at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
        ... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
        at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
        ... 82 common frames omitted

2023-10-26 10:38:52.838 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[Tomcat].[localhost]           : Processing ErrorPage[errorCode=0, location=/error]
2023-10-26 10:38:52.928 DEBUG 36220 --- [nio-8081-exec-2] o.s.security.web.FilterChainProxy        : Securing GET /error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorConfigured = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorRequest = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : proxyTicketRequest = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.cas.web.CasAuthenticationFilter    : requiresAuthentication = false
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.AnonymousAuthenticationFilter  : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:52.929 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.u.matcher.RegexRequestMatcher    : Checking match of request : '/error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:52.930 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.930 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.931 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.931 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.931 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:52.932 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.035 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.035 DEBUG 36220 --- [nio-8081-exec-2] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.035 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.a.i.FilterSecurityInterceptor    : Failed to authorize filter invocation [GET /error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox] with attributes [authenticated]
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] o.s.s.w.s.HttpSessionRequestCache        : Saved request http://echempad.iciq.es:8081/error?ticket=ST-2-tm6Ym7PHq6uGJPf9mqE-s1oN4oc-aleixmt-VirtualBox to session
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:53.036 DEBUG 36220 --- [nio-8081-exec-2] o.a.c.c.C.[.[.[/].[dispatcherServlet]    :  Disabling the response for further output
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [0]
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.a.coyote.http11.Http11InputBuffer      : Received []
2023-10-26 10:38:53.037 DEBUG 36220 --- [nio-8081-exec-2] o.apache.coyote.http11.Http11Processor   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Status in: [OPEN_READ], State out: [OPEN]
2023-10-26 10:38:53.063 DEBUG 36220 --- [nio-8081-exec-2] org.apache.tomcat.util.net.NioEndpoint   : Registered read interest for [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]]
2023-10-26 10:38:53.071 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.072 DEBUG 36220 --- [nio-8081-exec-3] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.072 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:53.072 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer      : Received [GET /login/cas?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E

]
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.t.util.http.Rfc6265CookieProcessor   : Cookies: Parsing b[]: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.catalina.connector.CoyoteAdapter     :  Requested cookie session id is 2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.authenticator.AuthenticatorBase    : Security checking request GET /login/cas
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] org.apache.catalina.realm.RealmBase      :   No applicable constraints defined
2023-10-26 10:38:53.073 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.authenticator.AuthenticatorBase    : Not subject to any constraint
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.security.web.FilterChainProxy        : Securing GET /login/cas?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = true
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : requiresAuthentication = true
2023-10-26 10:38:53.116 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorConfigured = false
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorRequest = false
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = true
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.http.Parameters   : Set encoding to UTF-8
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.http.Parameters   : Decoding query null UTF-8
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.http.Parameters   : Start processing with input [ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox]
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.c.a.CasAuthenticationProvider      : serviceUrl = http://echempad.iciq.es:8081/login/cas
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator    : Placing URL parameters in map.
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator    : Calling template URL attribute map.
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator    : Loading custom parameters from configuration.
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator    : Constructing validation url: https://echempad-cas.iciq.es:8443/cas/p3/serviceValidate?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox&service=http%3A%2F%2Fechempad.iciq.es%3A8081%2Flogin%2Fcas
2023-10-26 10:38:53.117 DEBUG 36220 --- [nio-8081-exec-3] o.j.c.c.v.Cas30ServiceTicketValidator    : Retrieving response from server.
2023-10-26 10:38:53.156 ERROR 36220 --- [nio-8081-exec-3] org.jasig.cas.client.util.CommonUtils    : SSL error getting response from host: echempad-cas.iciq.es : Error Message: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
        at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
        at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
        at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
        at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
        at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
        ... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
        at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
        ... 82 common frames omitted

2023-10-26 10:38:53.284 DEBUG 36220 --- [nio-8081-exec-3] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.284 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:53.285 ERROR 36220 --- [nio-8081-exec-3] o.a.c.c.C.[.[.[/].[dispatcherServlet]    : Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception

java.lang.RuntimeException: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:463) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractCasProtocolUrlBasedTicketValidator.retrieveResponseFromServer(AbstractCasProtocolUrlBasedTicketValidator.java:42) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.jasig.cas.client.validation.AbstractUrlBasedTicketValidator.validate(AbstractUrlBasedTicketValidator.java:191) ~[cas-client-core-3.6.4.jar:3.6.4]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticateNow(CasAuthenticationProvider.java:141) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.cas.authentication.CasAuthenticationProvider.authenticate(CasAuthenticationProvider.java:129) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:182) ~[spring-security-core-5.7.3.jar:5.7.3]
        at org.springframework.security.cas.web.CasAuthenticationFilter.attemptAuthentication(CasAuthenticationFilter.java:257) ~[spring-security-cas-5.8.8.jar:5.8.8]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:227) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186) ~[spring-security-web-5.7.3.jar:5.7.3]
        at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:358) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:271) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) ~[spring-web-5.3.9.jar:5.3.9]
        at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119) ~[spring-web-5.3.9.jar:5.3.9]
        at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) ~[tomcat-embed-core-9.0.52.jar:9.0.52]
        at java.base/java.lang.Thread.run(Thread.java:829) ~[na:na]
Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:360) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:303) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:298) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175) ~[na:na]
        at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443) ~[na:na]
        at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:421) ~[na:na]
        at java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:183) ~[na:na]
        at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.decode(SSLSocketImpl.java:1511) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1421) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:456) ~[na:na]
        at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:427) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:572) ~[na:na]
        at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:201) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1592) ~[na:na]
        at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1520) ~[na:na]
        at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:250) ~[na:na]
        at org.jasig.cas.client.util.CommonUtils.getResponseFromServer(CommonUtils.java:447) ~[cas-client-core-3.6.4.jar:3.6.4]
        ... 59 common frames omitted
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306) ~[na:na]
        at java.base/sun.security.validator.Validator.validate(Validator.java:264) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:222) ~[na:na]
        at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:129) ~[na:na]
        at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1341) ~[na:na]
        ... 76 common frames omitted
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:146) ~[na:na]
        at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:127) ~[na:na]
        at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297) ~[na:na]
        at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434) ~[na:na]
        ... 82 common frames omitted

2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.c.C.[Tomcat].[localhost]           : Processing ErrorPage[errorCode=0, location=/error]
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.security.web.FilterChainProxy        : Securing GET /error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Set SecurityContextHolder to empty SecurityContext
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : serviceTicketRequest = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorConfigured = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : proxyReceptorRequest = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : proxyTicketRequest = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.cas.web.CasAuthenticationFilter    : requiresAuthentication = false
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.a.AnonymousAuthenticationFilter  : Set SecurityContextHolder to anonymous SecurityContext
2023-10-26 10:38:53.524 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.u.matcher.RegexRequestMatcher    : Checking match of request : '/error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox'; against '/zkau\?dtid=.*&cmd_0=rmDesktop&.*'
2023-10-26 10:38:53.525 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.525 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.525 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.555 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.556 DEBUG 36220 --- [nio-8081-exec-3] s.w.s.m.m.a.RequestMappingHandlerMapping : Mapped to org.springframework.boot.autoconfigure.web.servlet.error.BasicErrorController#errorHtml(HttpServletRequest, HttpServletResponse)
2023-10-26 10:38:53.557 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.a.i.FilterSecurityInterceptor    : Failed to authorize filter invocation [GET /error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox] with attributes [authenticated]
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] o.s.s.w.s.HttpSessionRequestCache        : Saved request http://echempad.iciq.es:8081/error?ticket=ST-3-SLg5jUujcXoH-MBqYVh0-PvytRc-aleixmt-VirtualBox to session
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] w.c.HttpSessionSecurityContextRepository : Did not store empty SecurityContext
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] s.s.w.c.SecurityContextPersistenceFilter : Cleared SecurityContextHolder to complete request
2023-10-26 10:38:53.558 DEBUG 36220 --- [nio-8081-exec-3] o.a.c.c.C.[.[.[/].[dispatcherServlet]    :  Disabling the response for further output
2023-10-26 10:38:53.566 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.566 DEBUG 36220 --- [nio-8081-exec-3] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.567 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [0]
2023-10-26 10:38:53.600 DEBUG 36220 --- [nio-8081-exec-3] o.a.coyote.http11.Http11InputBuffer      : Received []
2023-10-26 10:38:53.600 DEBUG 36220 --- [nio-8081-exec-3] o.apache.coyote.http11.Http11Processor   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Status in: [OPEN_READ], State out: [OPEN]
2023-10-26 10:38:53.600 DEBUG 36220 --- [nio-8081-exec-3] org.apache.tomcat.util.net.NioEndpoint   : Registered read interest for [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] o.a.coyote.http11.Http11InputBuffer      : Before fill(): parsingHeader: [true], parsingRequestLine: [true], parsingRequestLinePhase: [0], parsingRequestLineStart: [0], byteBuffer.position(): [0], byteBuffer.limit(): [0], end: [581]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] o.a.tomcat.util.net.SocketWrapperBase    : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read from buffer: [0]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] org.apache.tomcat.util.net.NioEndpoint   : Socket: [org.apache.tomcat.util.net.NioEndpoint$NioSocketWrapper@76384951:org.apache.tomcat.util.net.NioChannel@78ffb9e6:java.nio.channels.SocketChannel[connected local=/127.0.0.1:8081 remote=/127.0.0.1:40938]], Read direct from socket: [581]
2023-10-26 10:38:53.601 DEBUG 36220 --- [nio-8081-exec-4] o.a.coyote.http11.Http11InputBuffer      : Received [GET /login/cas?ticket=ST-4-rDXa9uLwOv-bJShAfSIgreEoyMQ-aleixmt-VirtualBox HTTP/1.1
Host: echempad.iciq.es:8081
Connection: keep-alive
Cache-Control: max-age=0
DNT: 1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: pt-PT,pt;q=0.9
Cookie: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E

]
2023-10-26 10:38:53.602 DEBUG 36220 --- [nio-8081-exec-4] o.a.t.util.http.Rfc6265CookieProcessor   : Cookies: Parsing b[]: JSESSIONID=2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.602 DEBUG 36220 --- [nio-8081-exec-4] o.a.catalina.connector.CoyoteAdapter     :  Requested cookie session id is 2B8523D22A403AF44D07605D9F0D3B1E
2023-10-26 10:38:53.603 DEBUG 36220 --- [nio-8081-exec-4] o.a.c.authenticator.AuthenticatorBase    : Security checking request GET /login/cas
2023-10-26 10:38:53.627 DEBUG 36220 --- [nio-8081-exec-4] org.apache.catalina.realm.RealmBase      :   No applicable constraints defined
2023-10-26 10:38:53.628 DEBUG 36220 --- [nio-8081-exec-4] o.a.c.authenticator.AuthenticatorBase    : Not subject to any constraint


Sorry that I can't explain better what my problem is but I have been trying to fix this for days and I am starting to feel that I need some help.

If you need any other information please request it without hesitation.

Thank you so much.


Aleix

Ray Bon

unread,
Oct 26, 2023, 1:20:46 PM10/26/23
to cas-...@apereo.org
Aleix,

Cas sends your application a Service Ticket (ST-...), your application then validates that ST with cas through a back channel request (not browser). See https://apereo.github.io/cas/6.6.x/protocol/CAS-Protocol.html#web-flow-diagram
Cas will only accept the request if it is from https. Since cas cannot verify your app's certificate (none if it is http only), it returns a failed validation; so your app tries to get a new ST which starts the redirect loop.

You can create a self signed certificate and add it to the jvm that runs cas. See https://fawnoos.com/2021/02/13/cas63-bootiful-cas-client/

Ray

On Thu, 2023-10-26 at 02:42 -0700, Aleix Mariné wrote:
Notice: This message was sent from outside the University of Victoria email system. Please be cautious with links and sensitive information.

Hello there,

I am trying to configure a Spring Boot (backend) + ZK (frontend) application with ZK. I am following the tutorials but I am not sure why is not working: After entering into my app, I get redirected to the login page ofmy CAS overlay, but when I introduce my credentials in there and I get redirected into my application, the application sends redirect to CAS as if I was not authenticated. After that, CAS sends me back to the app and so on, which makes me enter into an infinite loops of redirects.

Aleix Mariné

unread,
Oct 29, 2023, 10:47:59 PM10/29/23
to CAS Community, Ray Bon
Dear Ray,

Thank you again for your answer. You did solve my problem. 

As you said, I needed to configure HTTPS on my application on the first place. Also, the process of creating a self-signed certificate for my application and adding it to the JVM that was running CAS was fundamental. 

Thank you so much. This "issue"  can be closed.


Aleix
Reply all
Reply to author
Forward
0 new messages