cd C:\Users\lfo\scm\bitbucket\devbox-sante\MS-SANTE\ms-sante\ms-sante-impl; "JAVA_HOME=C:\\Program Files\\Java\\jdk-11.0.13" M2_HOME=C:\\Users\\lfo\\softwares\\maven\\apache-maven-3.8.5 cmd /c "\"C:\\Users\\lfo\\softwares\\maven\\apache-maven-3.8.5\\bin\\mvn.cmd\" -Dtest=fr.devboxsante.sante.Mss_WithCps_Test -Dfile.encodign=UTF-8 \"-Dmaven.ext.class.path=C:\\Program Files\\NetBeans-15\\netbeans\\java\\maven-nblib\\netbeans-eventspy.jar;C:\\Program Files\\NetBeans-15\\netbeans\\java\\maven-nblib\\netbeans-cos.jar\" surefire:test"
Running NetBeans Compile On Save execution. Phase execution is skipped and output directories of dependency projects (with Compile on Save turned on) will be used instead of their jar artifacts.
Scanning for projects...
----------------< fr.devboxsante.mssante:ms-sante-impl >----------------
Building MS Santé :: impl 1.2.3-SNAPSHOT
--------------------------------[ jar ]---------------------------------
--- maven-surefire-plugin:2.22.2:test (default-cli) @ ms-sante-impl ---
-------------------------------------------------------
T E S T S
-------------------------------------------------------
12:00:26.678 [main] DEBUG org.springframework.test.context.junit4.SpringJUnit4ClassRunner - SpringJUnit4ClassRunner constructor called with [class fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.680 [main] DEBUG org.springframework.test.context.BootstrapUtils - Instantiating CacheAwareContextLoaderDelegate from class [org.springframework.test.context.cache.DefaultCacheAwareContextLoaderDelegate]
12:00:26.685 [main] DEBUG org.springframework.test.context.BootstrapUtils - Instantiating BootstrapContext using constructor [public org.springframework.test.context.support.DefaultBootstrapContext(java.lang.Class,org.springframework.test.context.CacheAwareContextLoaderDelegate)]
12:00:26.705 [main] DEBUG org.springframework.test.context.BootstrapUtils - Instantiating TestContextBootstrapper for test class [fr.devboxsante.sante.Mss_WithCps_Test] from class [org.springframework.boot.test.context.SpringBootTestContextBootstrapper]
12:00:26.720 [main] DEBUG org.springframework.test.context.support.AbstractContextLoader - Did not detect default resource location for test class [fr.devboxsante.sante.Mss_WithCps_Test]: class path resource [fr/devboxsante/sante/Mss_WithCps_Test-context.xml] does not exist
12:00:26.720 [main] DEBUG org.springframework.test.context.support.AbstractContextLoader - Did not detect default resource location for test class [fr.devboxsante.sante.Mss_WithCps_Test]: class path resource [fr/devboxsante/sante/Mss_WithCps_TestContext.groovy] does not exist
12:00:26.720 [main] INFO org.springframework.test.context.support.AbstractContextLoader - Could not detect default resource locations for test class [fr.devboxsante.sante.Mss_WithCps_Test]: no resource found for suffixes {-context.xml, Context.groovy}.
12:00:26.746 [main] DEBUG org.springframework.test.context.support.ActiveProfilesUtils - Could not find an 'annotation declaring class' for annotation type [org.springframework.test.context.ActiveProfiles] and class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.842 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - @TestExecutionListeners is not present for class [fr.devboxsante.sante.Mss_WithCps_Test]: using defaults.
12:00:26.842 [main] INFO org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Loaded default TestExecutionListener class names from location [META-INF/spring.factories]: [org.springframework.boot.test.mock.mockito.MockitoTestExecutionListener, org.springframework.boot.test.mock.mockito.ResetMocksTestExecutionListener, org.springframework.boot.test.autoconfigure.restdocs.RestDocsTestExecutionListener, org.springframework.boot.test.autoconfigure.web.client.MockRestServiceServerResetTestExecutionListener, org.springframework.boot.test.autoconfigure.web.servlet.MockMvcPrintOnlyOnFailureTestExecutionListener, org.springframework.boot.test.autoconfigure.web.servlet.WebDriverTestExecutionListener, org.springframework.boot.test.autoconfigure.webservices.client.MockWebServiceServerTestExecutionListener, org.springframework.test.context.web.ServletTestExecutionListener, org.springframework.test.context.support.DirtiesContextBeforeModesTestExecutionListener, org.springframework.test.context.support.DependencyInjectionTestExecutionListener, org.springframework.test.context.support.DirtiesContextTestExecutionListener, org.springframework.test.context.transaction.TransactionalTestExecutionListener, org.springframework.test.context.jdbc.SqlScriptsTestExecutionListener, org.springframework.test.context.event.EventPublishingTestExecutionListener]
12:00:26.848 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Skipping candidate TestExecutionListener [org.springframework.test.context.web.ServletTestExecutionListener] due to a missing dependency. Specify custom listener classes or make the default listener classes and their required dependencies available. Offending class: [javax/servlet/ServletContext]
12:00:26.849 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Skipping candidate TestExecutionListener [org.springframework.test.context.transaction.TransactionalTestExecutionListener] due to a missing dependency. Specify custom listener classes or make the default listener classes and their required dependencies available. Offending class: [org/springframework/transaction/interceptor/TransactionAttributeSource]
12:00:26.850 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Skipping candidate TestExecutionListener [org.springframework.test.context.jdbc.SqlScriptsTestExecutionListener] due to a missing dependency. Specify custom listener classes or make the default listener classes and their required dependencies available. Offending class: [org/springframework/transaction/interceptor/TransactionAttribute]
12:00:26.850 [main] INFO org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Using TestExecutionListeners: [org.springframework.test.context.support.DirtiesContextBeforeModesTestExecutionListener@66565121, org.springframework.boot.test.mock.mockito.MockitoTestExecutionListener@2fc6f97f, org.springframework.boot.test.autoconfigure.SpringBootDependencyInjectionTestExecutionListener@3d2ee678, org.springframework.test.context.support.DirtiesContextTestExecutionListener@6179e425, org.springframework.test.context.event.EventPublishingTestExecutionListener@35f26e72, org.springframework.boot.test.mock.mockito.ResetMocksTestExecutionListener@2d6764b2, org.springframework.boot.test.autoconfigure.restdocs.RestDocsTestExecutionListener@67304a40, org.springframework.boot.test.autoconfigure.web.client.MockRestServiceServerResetTestExecutionListener@49c6c24f, org.springframework.boot.test.autoconfigure.web.servlet.MockMvcPrintOnlyOnFailureTestExecutionListener@6fe1b4fb, org.springframework.boot.test.autoconfigure.web.servlet.WebDriverTestExecutionListener@79351f41, org.springframework.boot.test.autoconfigure.webservices.client.MockWebServiceServerTestExecutionListener@1c32386d]
12:00:26.851 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.852 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.853 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.853 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.855 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.855 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.873 [main] DEBUG org.springframework.test.context.junit4.SpringJUnit4ClassRunner - SpringJUnit4ClassRunner constructor called with [class fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.874 [main] DEBUG org.springframework.test.context.BootstrapUtils - Instantiating CacheAwareContextLoaderDelegate from class [org.springframework.test.context.cache.DefaultCacheAwareContextLoaderDelegate]
12:00:26.874 [main] DEBUG org.springframework.test.context.BootstrapUtils - Instantiating BootstrapContext using constructor [public org.springframework.test.context.support.DefaultBootstrapContext(java.lang.Class,org.springframework.test.context.CacheAwareContextLoaderDelegate)]
12:00:26.874 [main] DEBUG org.springframework.test.context.BootstrapUtils - Instantiating TestContextBootstrapper for test class [fr.devboxsante.sante.Mss_WithCps_Test] from class [org.springframework.boot.test.context.SpringBootTestContextBootstrapper]
12:00:26.875 [main] DEBUG org.springframework.test.context.support.AbstractContextLoader - Did not detect default resource location for test class [fr.devboxsante.sante.Mss_WithCps_Test]: class path resource [fr/devboxsante/sante/Mss_WithCps_Test-context.xml] does not exist
12:00:26.875 [main] DEBUG org.springframework.test.context.support.AbstractContextLoader - Did not detect default resource location for test class [fr.devboxsante.sante.Mss_WithCps_Test]: class path resource [fr/devboxsante/sante/Mss_WithCps_TestContext.groovy] does not exist
12:00:26.875 [main] INFO org.springframework.test.context.support.AbstractContextLoader - Could not detect default resource locations for test class [fr.devboxsante.sante.Mss_WithCps_Test]: no resource found for suffixes {-context.xml, Context.groovy}.
12:00:26.877 [main] DEBUG org.springframework.test.context.support.ActiveProfilesUtils - Could not find an 'annotation declaring class' for annotation type [org.springframework.test.context.ActiveProfiles] and class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.878 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - @TestExecutionListeners is not present for class [fr.devboxsante.sante.Mss_WithCps_Test]: using defaults.
12:00:26.878 [main] INFO org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Loaded default TestExecutionListener class names from location [META-INF/spring.factories]: [org.springframework.boot.test.mock.mockito.MockitoTestExecutionListener, org.springframework.boot.test.mock.mockito.ResetMocksTestExecutionListener, org.springframework.boot.test.autoconfigure.restdocs.RestDocsTestExecutionListener, org.springframework.boot.test.autoconfigure.web.client.MockRestServiceServerResetTestExecutionListener, org.springframework.boot.test.autoconfigure.web.servlet.MockMvcPrintOnlyOnFailureTestExecutionListener, org.springframework.boot.test.autoconfigure.web.servlet.WebDriverTestExecutionListener, org.springframework.boot.test.autoconfigure.webservices.client.MockWebServiceServerTestExecutionListener, org.springframework.test.context.web.ServletTestExecutionListener, org.springframework.test.context.support.DirtiesContextBeforeModesTestExecutionListener, org.springframework.test.context.support.DependencyInjectionTestExecutionListener, org.springframework.test.context.support.DirtiesContextTestExecutionListener, org.springframework.test.context.transaction.TransactionalTestExecutionListener, org.springframework.test.context.jdbc.SqlScriptsTestExecutionListener, org.springframework.test.context.event.EventPublishingTestExecutionListener]
12:00:26.878 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Skipping candidate TestExecutionListener [org.springframework.test.context.web.ServletTestExecutionListener] due to a missing dependency. Specify custom listener classes or make the default listener classes and their required dependencies available. Offending class: [javax/servlet/ServletContext]
12:00:26.879 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Skipping candidate TestExecutionListener [org.springframework.test.context.transaction.TransactionalTestExecutionListener] due to a missing dependency. Specify custom listener classes or make the default listener classes and their required dependencies available. Offending class: [org/springframework/transaction/interceptor/TransactionAttributeSource]
12:00:26.879 [main] DEBUG org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Skipping candidate TestExecutionListener [org.springframework.test.context.jdbc.SqlScriptsTestExecutionListener] due to a missing dependency. Specify custom listener classes or make the default listener classes and their required dependencies available. Offending class: [org/springframework/transaction/interceptor/TransactionAttribute]
12:00:26.879 [main] INFO org.springframework.boot.test.context.SpringBootTestContextBootstrapper - Using TestExecutionListeners: [org.springframework.test.context.support.DirtiesContextBeforeModesTestExecutionListener@2072acb2, org.springframework.boot.test.mock.mockito.MockitoTestExecutionListener@50ecde95, org.springframework.boot.test.autoconfigure.SpringBootDependencyInjectionTestExecutionListener@35a9782c, org.springframework.test.context.support.DirtiesContextTestExecutionListener@70a36a66, org.springframework.test.context.event.EventPublishingTestExecutionListener@45815ffc, org.springframework.boot.test.mock.mockito.ResetMocksTestExecutionListener@732f29af, org.springframework.boot.test.autoconfigure.restdocs.RestDocsTestExecutionListener@d3957fe, org.springframework.boot.test.autoconfigure.web.client.MockRestServiceServerResetTestExecutionListener@6622fc65, org.springframework.boot.test.autoconfigure.web.servlet.MockMvcPrintOnlyOnFailureTestExecutionListener@299321e2, org.springframework.boot.test.autoconfigure.web.servlet.WebDriverTestExecutionListener@23fb172e, org.springframework.boot.test.autoconfigure.webservices.client.MockWebServiceServerTestExecutionListener@64ba3208]
12:00:26.879 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.879 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.879 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.879 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.879 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.880 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.912 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.913 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
Running fr.devboxsante.sante.Mss_WithCps_Test
12:00:26.915 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.915 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.915 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.915 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.920 [main] DEBUG org.springframework.test.context.support.AbstractDirtiesContextTestExecutionListener - Before test class: context [DefaultTestContext@fb9c7aa testClass = Mss_WithCps_Test, testInstance = [null], testMethod = [null], testException = [null], mergedContextConfiguration = [MergedContextConfiguration@4c398c80 testClass = Mss_WithCps_Test, locations = '{}', classes = '{class fr.devboxsante.mssante.MssClientApplication}', contextInitializerClasses = '[]', activeProfiles = '{}', propertySourceLocations = '{}', propertySourceProperties = '{org.springframework.boot.test.context.SpringBootTestContextBootstrapper=true}', contextCustomizers = set[org.springframework.boot.test.context.filter.ExcludeFilterContextCustomizer@126253fd, org.springframework.boot.test.json.DuplicateJsonObjectContextCustomizerFactory$DuplicateJsonObjectContextCustomizer@5c86a017, org.springframework.boot.test.mock.mockito.MockitoContextCustomizer@0, org.springframework.boot.test.web.client.TestRestTemplateContextCustomizer@38145825, org.springframework.boot.test.autoconfigure.properties.PropertyMappingContextCustomizer@0, org.springframework.boot.test.autoconfigure.web.servlet.WebDriverContextCustomizerFactory$Customizer@4f49f6af, org.springframework.boot.test.context.SpringBootTestArgs@1], contextLoader = 'org.springframework.boot.test.context.SpringBootContextLoader', parent = [null]], attributes = map[[empty]]], class annotated with @DirtiesContext [false] with mode [null].
12:00:26.924 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved @ProfileValueSourceConfiguration [null] for test class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.924 [main] DEBUG org.springframework.test.annotation.ProfileValueUtils - Retrieved ProfileValueSource type [class org.springframework.test.annotation.SystemProfileValueSource] for class [fr.devboxsante.sante.Mss_WithCps_Test]
12:00:26.926 [main] DEBUG org.springframework.test.context.support.DependencyInjectionTestExecutionListener - Performing dependency injection for test context [[DefaultTestContext@fb9c7aa testClass = Mss_WithCps_Test, testInstance = fr.devboxsante.sante.Mss_WithCps_Test@30bcf3c1, testMethod = [null], testException = [null], mergedContextConfiguration = [MergedContextConfiguration@4c398c80 testClass = Mss_WithCps_Test, locations = '{}', classes = '{class fr.devboxsante.mssante.MssClientApplication}', contextInitializerClasses = '[]', activeProfiles = '{}', propertySourceLocations = '{}', propertySourceProperties = '{org.springframework.boot.test.context.SpringBootTestContextBootstrapper=true}', contextCustomizers = set[org.springframework.boot.test.context.filter.ExcludeFilterContextCustomizer@126253fd, org.springframework.boot.test.json.DuplicateJsonObjectContextCustomizerFactory$DuplicateJsonObjectContextCustomizer@5c86a017, org.springframework.boot.test.mock.mockito.MockitoContextCustomizer@0, org.springframework.boot.test.web.client.TestRestTemplateContextCustomizer@38145825, org.springframework.boot.test.autoconfigure.properties.PropertyMappingContextCustomizer@0, org.springframework.boot.test.autoconfigure.web.servlet.WebDriverContextCustomizerFactory$Customizer@4f49f6af, org.springframework.boot.test.context.SpringBootTestArgs@1], contextLoader = 'org.springframework.boot.test.context.SpringBootContextLoader', parent = [null]], attributes = map[[empty]]]].
12:00:26.940 [main] DEBUG org.springframework.test.context.support.TestPropertySourceUtils - Adding inlined properties to environment: {spring.jmx.enabled=false, org.springframework.boot.test.context.SpringBootTestContextBootstrapper=true}
____ ____ _
| _ \ _____ _| __ ) _____ __ ___ __ _ _ __ | |_ ___ ___ _ __ ___
| | | |/ _ \ \ / / _ \ / _ \ \/ /____/ __|/ _` | '_ \| __/ _ \_____ / __| '_ \/ __|
| |_| | __/\ V /| |_) | (_) > <_____\__ \ (_| | | | | || __/_____| (__| |_) \__ \
|____/ \___| \_/ |____/ \___/_/\_\ |___/\__,_|_| |_|\__\___| \___| .__/|___/
|_|
2022-10-12 12:00:27.141 INFO 7092 --- [ main] fr.devboxsante.sante.Mss_WithCps_Test : Starting Mss_WithCps_Test on lfo-xps15-2 with PID 7092 (started by lfo in C:\Users\lfo\scm\bitbucket\devbox-sante\MS-SANTE\ms-sante\ms-sante-impl)
2022-10-12 12:00:27.142 DEBUG 7092 --- [ main] fr.devboxsante.sante.Mss_WithCps_Test : Running with Spring Boot v2.3.4.RELEASE, Spring v5.2.9.RELEASE
2022-10-12 12:00:27.143 INFO 7092 --- [ main] fr.devboxsante.sante.Mss_WithCps_Test : No active profile set, falling back to default profiles: default
2022-10-12 12:00:27.475 INFO 7092 --- [ main] o.o.core.config.InitializationService : Initializing OpenSAML using the Java Services API
2022-10-12 12:00:27.837 INFO 7092 --- [ main] o.o.xmlsec.algorithm.AlgorithmRegistry : Algorithm failed runtime support check, will not be usable: http://www.w3.org/2001/04/xmlenc#ripemd160
2022-10-12 12:00:27.840 INFO 7092 --- [ main] o.o.xmlsec.algorithm.AlgorithmRegistry : Algorithm failed runtime support check, will not be usable: http://www.w3.org/2001/04/xmldsig-more#hmac-ripemd160
2022-10-12 12:00:27.846 INFO 7092 --- [ main] o.o.xmlsec.algorithm.AlgorithmRegistry : Algorithm failed runtime support check, will not be usable: http://www.w3.org/2001/04/xmldsig-more#rsa-ripemd160
2022-10-12 12:00:29.505 INFO 7092 --- [ main] fr.devboxsante.cps.internal.SystemUtils : Path init = null
2022-10-12 12:00:29.506 INFO 7092 --- [ main] fr.devboxsante.cps.internal.SystemUtils : OS name = windows 10
2022-10-12 12:00:29.507 INFO 7092 --- [ main] fr.devboxsante.cps.internal.SystemUtils : Path init = null
2022-10-12 12:00:29.507 INFO 7092 --- [ main] fr.devboxsante.cps.internal.SystemUtils : OS name = windows 10
2022-10-12 12:00:29.507 INFO 7092 --- [ main] f.d.cps.boot.CpsAutoConfiguration : springConfigLocation = null
2022-10-12 12:00:29.507 DEBUG 7092 --- [ main] f.d.cps.boot.CpsAutoConfiguration : springConfigLocation non spécifiée
2022-10-12 12:00:29.519 INFO 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Initialisation du truststore
2022-10-12 12:00:29.520 INFO 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Ajout du certificat http://igc-sante.esante.gouv.fr/AC/ACI-EL-ORG.cer au trustStore
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:29.528 CEST|SSLCipher.java:438|jdk.tls.keyLimits: entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
2022-10-12 12:00:30.357 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE, OU=0002 187512751, O=ASIP-SANTE, C=FR) est : Fri Jun 24 02:00:00 CEST 2033
2022-10-12 12:00:30.357 INFO 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Ajout du certificat http://igc-sante.esante.gouv.fr/AC%20TEST/ACI-EL-ORG-TEST.cer au trustStore
2022-10-12 12:00:30.756 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR) est : Fri Jun 24 02:00:00 CEST 2033
2022-10-12 12:00:30.758 INFO 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Ajout de la CRL http://igc-sante.esante.gouv.fr/CRL/ACI-EL-ORG.crl au trustStore
2022-10-12 12:00:31.848 INFO 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Ajout de la CRL http://igc-sante.esante.gouv.fr/CRL/ACI-EL-ORG-TEST.crl au trustStore
2022-10-12 12:00:32.340 INFO 7092 --- [ main] fr.devboxsante.sante.Mss_WithCps_Test : Started Mss_WithCps_Test in 5.399 seconds (JVM running for 6.036)
2022-10-12 12:00:32.571 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : Load module : C:\Windows\System32\cps3_pkcs11_w64.dll
2022-10-12 12:00:33.100 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _hasSession() : false
2022-10-12 12:00:33.100 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : init with pinProvider : fr.devboxsante.cps.CpsFacadeImpl$WrappedPinProvider
2022-10-12 12:00:33.101 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : getAvailableReaders()
2022-10-12 12:00:33.109 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : 2 readers found
2022-10-12 12:00:33.109 DEBUG 7092 --- [ main] f.d.cps.providers.PinProviderFrame : getPin()
2022-10-12 12:00:33.127 DEBUG 7092 --- [ main] f.d.cps.providers.PinProviderFrame : _checkErrors()
2022-10-12 12:00:33.127 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : getAvailableReaders()
2022-10-12 12:00:33.132 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : 2 readers found
2022-10-12 12:00:33.136 DEBUG 7092 --- [ main] f.d.cps.providers.PinProviderFrame : _initInputs()
2022-10-12 12:00:33.136 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : getAvailableReaders()
2022-10-12 12:00:33.141 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : 2 readers found
2022-10-12 12:00:33.142 DEBUG 7092 --- [ main] f.d.cps.providers.PinProviderFrame : _initReadersInputs()
2022-10-12 12:00:33.143 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : selectReader(1)
2022-10-12 12:00:33.158 DEBUG 7092 --- [ main] f.d.cps.providers.PinProviderFrame : _putLock()
2022-10-12 12:00:37.597 DEBUG 7092 --- [WT-EventQueue-0] f.d.cps.providers.PinProviderFrame : _checkErrors()
2022-10-12 12:00:37.598 DEBUG 7092 --- [WT-EventQueue-0] f.d.cps.internal.IAIKCpsFacadeImpl : getAvailableReaders()
2022-10-12 12:00:37.604 DEBUG 7092 --- [WT-EventQueue-0] f.d.cps.internal.IAIKCpsFacadeImpl : 2 readers found
2022-10-12 12:00:37.608 DEBUG 7092 --- [WT-EventQueue-0] f.d.cps.providers.PinProviderFrame : notifyLock()
2022-10-12 12:00:37.614 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _init(****)
2022-10-12 12:00:37.614 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _isLogged() : false
2022-10-12 12:00:37.616 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _hasSession() : false
2022-10-12 12:00:37.616 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _initSession()
2022-10-12 12:00:37.616 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : hasCard() : true
2022-10-12 12:00:37.616 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : selectedSlot : Slot ID: 0x1
Module: Module Name: C:\Windows\System32\cps3_pkcs11_w64.dll
2022-10-12 12:00:37.617 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : openSession on token 1
2022-10-12 12:00:37.619 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : session.login(****)
2022-10-12 12:00:37.674 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _isLogged() : true
2022-10-12 12:00:37.674 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _fireLoggedInEvent()
2022-10-12 12:00:37.681 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _hasSession() : true
2022-10-12 12:00:37.681 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _isLogged() : true
2022-10-12 12:00:37.702 DEBUG 7092 --- [ main] fr.devboxsante.cps.asn1.ASN1Decoder : DER ApplicationSpecific[3]
Tagged [0] IMPLICIT
DER Octet String[5]
8025000001 %
Tagged [1] IMPLICIT
DER Octet String[5]
2800811112 (
Tagged [2] IMPLICIT
DER Octet String[1]
80
Tagged [3] IMPLICIT
DER Octet String[4]
20201215
Tagged [4] IMPLICIT
DER Octet String[4]
20231215 #
2022-10-12 12:00:37.703 DEBUG 7092 --- [ main] fr.devboxsante.cps.asn1.ASN1Decoder : DER ApplicationSpecific[4]
Tagged [0] IMPLICIT
DER Octet String[1]
16
Tagged [1] IMPLICIT
DER Octet String[18]
4d45442d4353205250505330303239363134 MED-CS RPPS0029614
Tagged [3] IMPLICIT
DER Octet String[4]
414e4e45 ANNE
Tagged [4] IMPLICIT
DER Octet String[4]
414e4e45 ANNE
2022-10-12 12:00:37.704 DEBUG 7092 --- [ main] fr.devboxsante.cps.asn1.ASN1Decoder : DER ApplicationSpecific[5]
Tagged [0] IMPLICIT
DER Octet String[8]
6672202020202020 fr
2022-10-12 12:00:37.705 DEBUG 7092 --- [ main] fr.devboxsante.cps.asn1.ASN1Decoder : DER ApplicationSpecific[13]
Tagged [0] IMPLICIT
DER Octet String[1]
00
Tagged [1] IMPLICIT
DER Octet String[12]
383939373030323936313430 899700296140
Tagged [2] IMPLICIT
DER Octet String[1]
0a
Tagged [4] IMPLICIT
DER Octet String[18]
4d45442d4353205250505330303239363134 MED-CS RPPS0029614
Tagged [5] IMPLICIT
DER Octet String[4]
534d3236 SM26
2022-10-12 12:00:37.709 DEBUG 7092 --- [ main] fr.devboxsante.cps.asn1.ASN1Decoder : DER ApplicationSpecific[0]
Tagged [0] IMPLICIT
Sequence
Tagged [0] IMPLICIT
DER Octet String[1]
01
Tagged [1] IMPLICIT
DER Octet String[5]
2000156836 h6
Tagged [2] IMPLICIT
DER Octet String[3]
999999
Tagged [3] IMPLICIT
DER Octet String[3]
999999
Tagged [4] IMPLICIT
DER Octet String[1]
11
2022-10-12 12:00:37.711 DEBUG 7092 --- [ main] fr.devboxsante.cps.asn1.ASN1Decoder : DER ApplicationSpecific[14]
Tagged [0] IMPLICIT
DER Octet String[1]
01
Tagged [1] IMPLICIT
DER Octet String[1]
00
Tagged [3] IMPLICIT
DER Octet String[1]
01
Tagged [4] IMPLICIT
DER Octet String[25]
43454e5452452044452053414e544520525050533135363833 CENTRE DE SANTE RPPS15683
Tagged [5] IMPLICIT
DER Octet String[10]
31304230313536383332 10B0156832
Tagged [6] IMPLICIT
DER Octet String[4]
53413035 SA05
2022-10-12 12:00:37.713 DEBUG 7092 --- [ main] f.d.cps.providers.PinProviderFrame : selectActivity(1)
2022-10-12 12:00:37.814 INFO 7092 --- [ main] o.a.c.w.s.f.ReflectionServiceFactoryBean : Creating Service {http://services.msg.mss.asip.fr/}AnnuaireServiceService from class fr.asip.mss.msg.services.AnnuaireService
2022-10-12 12:00:38.289 INFO 7092 --- [ main] o.a.c.services.AnnuaireService.REQ_OUT : REQ_OUT
Address: https://mss-msg-igcsante.formation.mssante.fr/mss-msg-services/services/Annuaire/soap/v1/listEmails
HttpMethod: POST
Content-Type: text/xml
ExchangeId: a7b7e3ba-b7be-4cfd-b2a7-616a7afcd78e
ServiceName: AnnuaireServiceService
PortName: AnnuaireServicePort
PortTypeName: AnnuaireService
Headers: {PAOS=ver='urn:liberty:paos:2003-08';'urn:oasis:names:tc:SAML:2.0:profiles:SSO:ecp', SOAPAction="", Accept=application/vnd.paos+xml', Connection=Keep-Alive}
Payload: http://services.msg.mss.asip.fr/AnnuaireService/listEmailsurn:uuid:b4432f07-1d20-40b9-8c92-8b4dfce954d2https://mss-msg-igcsante.formation.mssante.fr/mss-msg-services/services/Annuaire/soap/v1/listEmailshttp://www.w3.org/2005/08/addressing/anonymous899700296140
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.346 CEST|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=mss-msg-igcsante.formation.mssante.fr) was replaced with (type=host_name (0), value=mss-msg-igcsante.formation.mssante.fr)
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:38.358 CEST|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:38.358 CEST|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
javax.net.ssl|INFO|01|main|2022-10-12 12:00:38.360 CEST|AlpnExtension.java:178|No available application protocols
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.360 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.361 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.363 CEST|ClientHello.java:653|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "CB 76 1D 60 2F 39 92 91 10 CF A3 D6 9A 84 B8 C3 3D 08 65 DE 70 C5 79 3D 57 BB C9 41 E9 21 6E 21",
"session id" : "",
"cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
"compression methods" : "00",
"extensions" : [
"server_name (0)": {
type=host_name (0), value=mss-msg-igcsante.formation.mssante.fr
},
"status_request (5)": {
"certificate status type": ocsp
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
},
"supported_groups (10)": {
"versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
},
"ec_point_formats (11)": {
"formats": [uncompressed]
},
"signature_algorithms (13)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"signature_algorithms_cert (50)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"status_request_v2 (17)": {
"cert status request": {
"certificate status type": ocsp_multi
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
}
},
"extended_master_secret (23)": {
},
"supported_versions (43)": {
"versions": [TLSv1.2]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.415 CEST|ServerHello.java:872|Consuming ServerHello handshake message (
"ServerHello": {
"server version" : "TLSv1.2",
"random" : "7F 4B CB B3 CF 43 FE 8B 29 B0 36 61 B0 23 CE 3F 58 0B 1A 6F B8 F7 78 CD 1D 98 F5 A2 E6 75 B4 69",
"session id" : "C9 81 30 CC 16 00 5A DD D6 8E 82 01 85 81 65 0F 7E E9 BC C2 45 A3 D7 8E A8 BC 8B 0D 8B 71 B6 92",
"cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030)",
"compression methods" : "00",
"extensions" : [
"renegotiation_info (65,281)": {
"renegotiated connection": []
},
"ec_point_formats (11)": {
"formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.416 CEST|SSLExtensions.java:173|Ignore unavailable extension: supported_versions
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.416 CEST|ServerHello.java:968|Negotiated protocol version: TLSv1.2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.416 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.416 CEST|SSLExtensions.java:173|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.416 CEST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.416 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.416 CEST|SSLExtensions.java:192|Consumed extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:207|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:38.417 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.423 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message (
"Certificates": [
"certificate" : {
"version" : "v3",
"serial number" : "1D 5D E2 5E 3D C1 4B DE 21 0F 2C 0F 23 0E 86 52",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2022-06-02 13:49:28.000 CEST",
"not after" : "2024-06-02 13:49:28.000 CEST",
"subject" : "CN=mss-msg-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 1.2.250.1.71.1.2.5 Criticality=false
},
{
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: ocsp
accessLocation: URIName: http://ocsp.esante.gouv.fr
,
accessMethod: caIssuers
accessLocation: URIName: http://igc-sante.esante.gouv.fr/AC%20TEST/ACI-EL-ORG-TEST.cer
]
]
},
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
},
{
ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACI-EL-ORG-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?certificaterevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [1.2.250.1.213.1.7.2.1.1.1.1]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
]
},
{
ObjectId: 2.5.29.46 Criticality=false
FreshestCRL [
[DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?deltarevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
},
{
ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mss-msg-igcsante.formation.mssante.fr
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 7C C2 8A BF AB F2 40 56 48 DD 78 75 9B A6 42 F9 ......@VH.xu..B.
0010: 04 05 4D D4 ..M.
]
]
}
]},
"certificate" : {
"version" : "v3",
"serial number" : "11 20 61 F3 C6 E8 4F C2 EF B1 8B F5 25 8E 1D EB 4E C6",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC RACINE IGC-SANTE ELEMENTAIRE, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2013-06-25 02:00:00.000 CEST",
"not after" : "2033-06-24 02:00:00.000 CEST",
"subject" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 9C AD 86 BB A6 AA CA C5 61 3A 04 B0 47 FD DC 3B ........a:..G..;
0010: CD 3D 57 F4 .=W.
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:0
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACR-EL-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/CN=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,OU=IGC-SANTE%20TEST,OU=0002%20187512751,O=ASIP-SANTE,C=FR?certificaterevocationlist;binary?base?objectclass=pkiCa]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
}
]}
]
)
2022-10-12 12:00:38.423 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=mss-msg-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR) est : Sun Jun 02 13:49:28 CEST 2024
2022-10-12 12:00:38.424 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR) est : Fri Jun 24 02:00:00 CEST 2033
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.443 CEST|ECDHServerKeyExchange.java:523|Consuming ECDH ServerKeyExchange handshake message (
"ECDH ServerKeyExchange": {
"parameters": {
"named group": "secp256r1"
"ecdh public": {
0000: 04 AA 00 6D 04 12 7C 51 C0 9B FC 4C E9 DF FB 03 ...m...Q...L....
0010: E4 88 25 F2 A4 6A B5 EF 96 09 95 7B 36 25 B3 CF ..%..j......6%..
0020: C3 21 E1 4F 77 64 A8 DD A1 9D 6D 46 34 2C E8 25 .!.Owd....mF4,.%
0030: 93 6C 24 DC 17 B9 6F E4 15 16 63 54 64 F3 47 25 .l$...o...cTd.G%
0040: 37 7
},
},
"digital signature": {
"signature algorithm": "rsa_pkcs1_sha512"
"signature": {
0000: 8F D3 8B 0B EE 5E 3F 6F 1D 36 EA 7D B5 2E 17 71 .....^?o.6.....q
0010: 1B C4 23 4E 06 12 C2 A8 E2 75 95 FB 94 48 64 51 ..#N.....u...HdQ
0020: 6C 0A 0D AE 9D 14 8E 88 A6 21 FF E6 C6 56 4C A8 l........!...VL.
0030: 5D 40 80 5F 5A 39 E1 4E 49 96 D6 E6 00 5B 50 B8 ]@._Z9.NI....[P.
0040: 9E F6 E5 B2 1B B1 FF 9F 85 5A 07 EE A5 5F B6 C1 .........Z..._..
0050: 3B 45 D3 DF 01 B2 96 24 62 B7 1C 82 48 DC 4D 41 ;E.....$b...H.MA
0060: A3 A8 6D 6A A2 68 20 2E 32 4C 80 00 C7 75 2C D3 ..mj.h .2L...u,.
0070: 10 2E 13 18 F2 C4 02 20 9C 3E 09 26 1B 71 FF 20 ....... .>.&.q.
0080: EC 31 D1 9A 77 D9 78 6C 0C 65 68 15 1A 57 39 DD .1..w.xl.eh..W9.
0090: E9 10 A0 5A 0E FA 6F 0F 47 59 47 11 CA 46 85 0A ...Z..o.GYG..F..
00A0: 98 F5 8F 74 6B 50 C5 55 BC 19 29 86 98 0E 9E 71 ...tkP.U..)....q
00B0: 62 8F E8 6C 4F 5D D1 CA D5 D4 DE 91 4E C3 EC DF b..lO]......N...
00C0: 41 88 40 A8 E4 8A 5E B5 57 F8 C6 57 B3 F8 4F 8F A.@...^.W..W..O.
00D0: 53 12 F1 95 B2 F6 FF 24 89 37 17 2B 2B A3 6B 82 S......$.7.++.k.
00E0: 92 FF 35 E6 D7 4A E9 8A D3 6E E8 ED 3C B0 E0 23 ..5..J...n..<..#
00F0: 25 ED BE 2D 6D 3E B8 5F CD FE FD 5A 97 01 30 43 %..-m>._...Z..0C
},
}
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.444 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message (
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.452 CEST|ECDHClientKeyExchange.java:409|Produced ECDHE ClientKeyExchange handshake message (
"ECDH ClientKeyExchange": {
"ecdh public": {
0000: 04 BB BC D7 4C 75 A7 F5 2E 52 44 19 6F B8 AF CC ....Lu...RD.o...
0010: 51 EE 58 A4 8A 2D 13 E6 BF 79 26 EB 13 78 D3 CA Q.X..-...y&..x..
0020: B4 17 5E D3 1F AF 7E 7D B4 2A 76 D8 DC AA 04 B3 ..^......*v.....
0030: FA FE E5 69 0C 0C F2 F9 73 1E C3 BE 5A 29 C8 55 ...i....s...Z).U
0040: 02 .
},
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.462 CEST|ChangeCipherSpec.java:115|Produced ChangeCipherSpec message
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.462 CEST|Finished.java:398|Produced client Finished handshake message (
"Finished": {
"verify data": {
0000: 7C 3C 69 A6 0E AB AA 7C 47 1E CF 3B
}'}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.512 CEST|ChangeCipherSpec.java:149|Consuming ChangeCipherSpec message
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.514 CEST|Finished.java:535|Consuming server Finished handshake message (
"Finished": {
"verify data": {
0000: 46 F4 14 4B 92 5E 3E 3C 1A 0D 33 16
}'}
)
2022-10-12 12:00:38.597 DEBUG 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : handling authentication Request
2022-10-12 12:00:38.677 INFO 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : cookieHeader : ROUTEID=.MOB_1; path=/; DOMAIN=.formation.mssante.fr
2022-10-12 12:00:38.677 INFO 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : cookieHeader : JSESSIONID=AE3B7536F5AFFFF55B536F0F1A9BCABC.MOB_2; Path=/mss-msg-services-igcsante; Secure; HttpOnly
2022-10-12 12:00:38.678 DEBUG 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : sessionId from request : JSESSIONID=AE3B7536F5AFFFF55B536F0F1A9BCABC.MOB_2
2022-10-12 12:00:38.678 INFO 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : cookieHeader : SessionStatId=b7ba464b.5ead376f86eb3; path=/; expires=Thu, 10-Oct-30 10:00:38 GMT; domain=.mss.sii.local
2022-10-12 12:00:38.678 DEBUG 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : sessionId is : JSESSIONID=AE3B7536F5AFFFF55B536F0F1A9BCABC.MOB_2
2022-10-12 12:00:38.678 DEBUG 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : finally sessionId is : JSESSIONID=AE3B7536F5AFFFF55B536F0F1A9BCABC.MOB_2
2022-10-12 12:00:38.678 DEBUG 7092 --- [ main] f.d.mssante.paos.PAOSInterceptor : finally store MssSessionId : JSESSIONID=AE3B7536F5AFFFF55B536F0F1A9BCABC.MOB_2
2022-10-12 12:00:38.678 DEBUG 7092 --- [ main] f.d.m.security.cps.CpsPAOSAuthenticator : authenticateLocal : Perform PAOS authentication
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.802 CEST|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=mss-idp-igcsante.formation.mssante.fr) was replaced with (type=host_name (0), value=mss-idp-igcsante.formation.mssante.fr)
javax.net.ssl|INFO|01|main|2022-10-12 12:00:38.810 CEST|AlpnExtension.java:178|No available application protocols
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.810 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.810 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.811 CEST|ClientHello.java:653|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "7E 1D 92 63 A1 BE 54 86 15 FC 0F 72 40 DB A4 90 48 C7 83 35 C3 6F D5 50 66 2B 08 8A 9A 2E 27 4F",
"session id" : "",
"cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
"compression methods" : "00",
"extensions" : [
"server_name (0)": {
type=host_name (0), value=mss-idp-igcsante.formation.mssante.fr
},
"status_request (5)": {
"certificate status type": ocsp
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
},
"supported_groups (10)": {
"versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
},
"ec_point_formats (11)": {
"formats": [uncompressed]
},
"signature_algorithms (13)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"signature_algorithms_cert (50)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"status_request_v2 (17)": {
"cert status request": {
"certificate status type": ocsp_multi
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
}
},
"extended_master_secret (23)": {
},
"supported_versions (43)": {
"versions": [TLSv1.2]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|ServerHello.java:872|Consuming ServerHello handshake message (
"ServerHello": {
"server version" : "TLSv1.2",
"random" : "45 F0 CD 3A 23 89 F3 46 71 07 82 83 A7 32 80 4E 90 54 55 84 5E 8A 07 06 44 24 4F B2 F6 BF BC 9F",
"session id" : "A2 D4 27 9D 3A 8E 33 9B 68 DA 30 9B 02 4F 9A 20 71 8A 52 23 AB 77 D7 8C E6 AC 1A 8B B6 FA 56 B6",
"cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030)",
"compression methods" : "00",
"extensions" : [
"renegotiation_info (65,281)": {
"renegotiated connection": []
},
"ec_point_formats (11)": {
"formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:173|Ignore unavailable extension: supported_versions
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|ServerHello.java:968|Negotiated protocol version: TLSv1.2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:173|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:192|Consumed extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:207|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:38.867 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.870 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message (
"Certificates": [
"certificate" : {
"version" : "v3",
"serial number" : "1D 5D E2 5E 3D C1 4B DE B7 F5 6F 4A 37 32 E4 4B",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2022-06-02 14:01:29.000 CEST",
"not after" : "2024-06-02 14:01:29.000 CEST",
"subject" : "CN=mss-idp-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 1.2.250.1.71.1.2.5 Criticality=false
},
{
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: ocsp
accessLocation: URIName: http://ocsp.esante.gouv.fr
,
accessMethod: caIssuers
accessLocation: URIName: http://igc-sante.esante.gouv.fr/AC%20TEST/ACI-EL-ORG-TEST.cer
]
]
},
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
},
{
ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACI-EL-ORG-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?certificaterevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [1.2.250.1.213.1.7.2.1.1.1.1]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
]
},
{
ObjectId: 2.5.29.46 Criticality=false
FreshestCRL [
[DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?deltarevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
},
{
ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mss-idp-igcsante.formation.mssante.fr
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 97 A1 EF 08 5D 06 3D C0 41 DA EB 7D 06 B5 3A 8D ....].=.A.....:.
0010: 55 46 C8 07 UF..
]
]
}
]},
"certificate" : {
"version" : "v3",
"serial number" : "11 20 61 F3 C6 E8 4F C2 EF B1 8B F5 25 8E 1D EB 4E C6",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC RACINE IGC-SANTE ELEMENTAIRE, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2013-06-25 02:00:00.000 CEST",
"not after" : "2033-06-24 02:00:00.000 CEST",
"subject" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 9C AD 86 BB A6 AA CA C5 61 3A 04 B0 47 FD DC 3B ........a:..G..;
0010: CD 3D 57 F4 .=W.
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:0
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACR-EL-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/CN=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,OU=IGC-SANTE%20TEST,OU=0002%20187512751,O=ASIP-SANTE,C=FR?certificaterevocationlist;binary?base?objectclass=pkiCa]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
}
]}
]
)
2022-10-12 12:00:38.870 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=mss-idp-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR) est : Sun Jun 02 14:01:29 CEST 2024
2022-10-12 12:00:38.870 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR) est : Fri Jun 24 02:00:00 CEST 2033
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.880 CEST|ECDHServerKeyExchange.java:523|Consuming ECDH ServerKeyExchange handshake message (
"ECDH ServerKeyExchange": {
"parameters": {
"named group": "secp256r1"
"ecdh public": {
0000: 04 5D E4 3C 23 67 5D B7 B9 BB 57 E1 B6 E0 13 29 .].<#g]...W....)
0010: 57 40 D3 09 6D AF 87 F5 83 B8 60 08 3E 2F 47 1A W@..m.....`.>/G.
0020: 3E B2 AC D9 A2 E8 C2 01 49 11 70 4D D3 47 A4 46 >.......I.pM.G.F
0030: 4A BC 82 7E A1 0F 89 8E 26 52 4B 8D BF 11 BC FD J.......&RK.....
0040: DD .
},
},
"digital signature": {
"signature algorithm": "rsa_pkcs1_sha512"
"signature": {
0000: 5C 83 8E 47 47 FF 98 8A 30 25 E2 17 E8 D6 1A E8 \..GG...0%......
0010: DB 34 16 54 1A 6C 44 6B 8D C8 22 0D F5 ED 56 6F .4.T.lDk.."...Vo
0020: BE C9 76 53 31 B0 92 D3 CB AC AF F3 36 40 D4 4B ..vS1.......6@.K
0030: DA 49 39 96 38 A5 39 85 4F 70 2B 94 4F 50 F2 9C .I9.8.9.Op+.OP..
0040: 90 4E 71 62 4A 0D E0 36 F7 FC 45 66 A3 1B EC D0 .NqbJ..6..Ef....
0050: 06 97 6A C4 AA 70 C8 85 84 70 00 58 74 D3 C6 13 ..j..p...p.Xt...
0060: 68 90 FA F3 72 61 B3 5C CD 53 FB 2D 0A 93 13 8E h...ra.\.S.-....
0070: C0 63 D7 05 9F 29 09 0E 3A B5 79 C4 0F 9D 07 06 .c...)..:.y.....
0080: 63 52 C9 F3 21 BF DF EA 8D 9B 6D DF 68 29 87 17 cR..!.....m.h)..
0090: 3B 5D 03 3E F6 6D 56 F2 31 2C 08 C7 42 0F 45 CB ;].>.mV.1,..B.E.
00A0: 61 8C FA 7D 49 30 C4 44 3C 25 97 0A 0D BA 6B 3D a...I0.D<%....k=
00B0: 0F B9 F3 56 68 02 2F FB 2A BE 04 54 F4 40 DF CB ...Vh./.*..T.@..
00C0: FE E6 8D 79 6D 0A 67 41 43 29 B8 B1 F1 CD 21 D1 ...ym.gAC)....!.
00D0: 0C 44 73 15 88 17 65 50 B3 CB C8 FD 5A 63 61 54 .Ds...eP....ZcaT
00E0: 88 F8 E1 F2 95 43 C9 92 AC 5A 3D 76 36 C0 C5 91 .....C...Z=v6...
00F0: 44 C3 78 21 D3 DF 38 5A FF 33 63 5C F4 BF AD 1B D.x!..8Z.3c\....
},
}
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.881 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message (
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.882 CEST|ECDHClientKeyExchange.java:409|Produced ECDHE ClientKeyExchange handshake message (
"ECDH ClientKeyExchange": {
"ecdh public": {
0000: 04 26 42 14 DC B8 7E A1 18 B8 CD 4B 07 35 A2 AF .&B........K.5..
0010: 63 64 A6 76 12 95 ED 2A 47 A5 24 47 D9 92 A4 2E cd.v...*G.$G....
0020: 78 97 F8 AA CB 60 D8 0E 3C 15 5E 92 46 36 1D 7D x....`..<.^.F6..
0030: ED 17 C3 15 D3 28 DA 3B 5A DB DF 13 21 78 C8 64 .....(.;Z...!x.d
0040: 77 w
},
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.885 CEST|ChangeCipherSpec.java:115|Produced ChangeCipherSpec message
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.885 CEST|Finished.java:398|Produced client Finished handshake message (
"Finished": {
"verify data": {
0000: FB 4B 19 A6 27 F9 84 5F 43 70 EF C5
}'}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.934 CEST|ChangeCipherSpec.java:149|Consuming ChangeCipherSpec message
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.934 CEST|Finished.java:535|Consuming server Finished handshake message (
"Finished": {
"verify data": {
0000: A3 E0 11 1B F6 E5 6C E9 EC AB 76 15
}'}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.989 CEST|HelloRequest.java:181|Consuming HelloRequest handshake message (
)
javax.net.ssl|INFO|01|main|2022-10-12 12:00:38.991 CEST|AlpnExtension.java:178|No available application protocols
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.991 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:38.991 CEST|ClientHello.java:653|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "C6 7F AF A3 9D 59 3E BF 7C 42 F0 19 E0 2B 2B E0 E4 1C 63 C8 7C FB 84 A4 B3 B5 BC F4 0B ED B7 90",
"session id" : "A2 D4 27 9D 3A 8E 33 9B 68 DA 30 9B 02 4F 9A 20 71 8A 52 23 AB 77 D7 8C E6 AC 1A 8B B6 FA 56 B6",
"cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F)]",
"compression methods" : "00",
"extensions" : [
"server_name (0)": {
type=host_name (0), value=mss-idp-igcsante.formation.mssante.fr
},
"status_request (5)": {
"certificate status type": ocsp
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
},
"supported_groups (10)": {
"versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
},
"ec_point_formats (11)": {
"formats": [uncompressed]
},
"signature_algorithms (13)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"signature_algorithms_cert (50)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"status_request_v2 (17)": {
"cert status request": {
"certificate status type": ocsp_multi
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
}
},
"extended_master_secret (23)": {
},
"supported_versions (43)": {
"versions": [TLSv1.2]
},
"renegotiation_info (65,281)": {
"renegotiated connection": [FB 4B 19 A6 27 F9 84 5F 43 70 EF C5]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.045 CEST|ServerHello.java:872|Consuming ServerHello handshake message (
"ServerHello": {
"server version" : "TLSv1.2",
"random" : "F3 25 9B 28 CB ED 91 09 C7 F0 3F 88 31 47 AE CD AB F4 6A 1D 2C 52 A5 7D B8 A8 71 50 76 C3 EC EA",
"session id" : "E1 8E 3A A1 8D CF 1F D7 4B F0 FB 72 9B D9 76 D4 E0 6B 95 14 EC 0C 40 CA E8 39 02 EA 2C F4 0F 65",
"cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030)",
"compression methods" : "00",
"extensions" : [
"renegotiation_info (65,281)": {
"renegotiated connection": [FB 4B 19 A6 27 F9 84 5F 43 70 EF C5 A3 E0 11 1B F6 E5 6C E9 EC AB 76 15]
},
"ec_point_formats (11)": {
"formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.045 CEST|SSLExtensions.java:173|Ignore unavailable extension: supported_versions
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.045 CEST|ServerHello.java:968|Negotiated protocol version: TLSv1.2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.045 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:173|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:192|Consumed extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:207|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:39.046 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.058 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message (
"Certificates": [
"certificate" : {
"version" : "v3",
"serial number" : "1D 5D E2 5E 3D C1 4B DE B7 F5 6F 4A 37 32 E4 4B",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2022-06-02 14:01:29.000 CEST",
"not after" : "2024-06-02 14:01:29.000 CEST",
"subject" : "CN=mss-idp-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 1.2.250.1.71.1.2.5 Criticality=false
},
{
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: ocsp
accessLocation: URIName: http://ocsp.esante.gouv.fr
,
accessMethod: caIssuers
accessLocation: URIName: http://igc-sante.esante.gouv.fr/AC%20TEST/ACI-EL-ORG-TEST.cer
]
]
},
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
},
{
ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACI-EL-ORG-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?certificaterevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [1.2.250.1.213.1.7.2.1.1.1.1]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
]
},
{
ObjectId: 2.5.29.46 Criticality=false
FreshestCRL [
[DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?deltarevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
},
{
ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mss-idp-igcsante.formation.mssante.fr
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 97 A1 EF 08 5D 06 3D C0 41 DA EB 7D 06 B5 3A 8D ....].=.A.....:.
0010: 55 46 C8 07 UF..
]
]
}
]},
"certificate" : {
"version" : "v3",
"serial number" : "11 20 61 F3 C6 E8 4F C2 EF B1 8B F5 25 8E 1D EB 4E C6",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC RACINE IGC-SANTE ELEMENTAIRE, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2013-06-25 02:00:00.000 CEST",
"not after" : "2033-06-24 02:00:00.000 CEST",
"subject" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 9C AD 86 BB A6 AA CA C5 61 3A 04 B0 47 FD DC 3B ........a:..G..;
0010: CD 3D 57 F4 .=W.
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:0
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACR-EL-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/CN=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,OU=IGC-SANTE%20TEST,OU=0002%20187512751,O=ASIP-SANTE,C=FR?certificaterevocationlist;binary?base?objectclass=pkiCa]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
}
]}
]
)
2022-10-12 12:00:39.058 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=mss-idp-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR) est : Sun Jun 02 14:01:29 CEST 2024
2022-10-12 12:00:39.058 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR) est : Fri Jun 24 02:00:00 CEST 2033
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.060 CEST|ECDHServerKeyExchange.java:523|Consuming ECDH ServerKeyExchange handshake message (
"ECDH ServerKeyExchange": {
"parameters": {
"named group": "secp256r1"
"ecdh public": {
0000: 04 C8 FC 76 15 A8 72 59 E1 EA B2 9B D5 58 16 AA ...v..rY.....X..
0010: CF 7C D0 82 94 3F 95 5A 9C D1 DA A0 D5 78 8D 29 .....?.Z.....x.)
0020: 63 FE 44 B7 DC 34 44 73 A2 B1 21 DA 3C AC F7 C7 c.D..4Ds..!.<...
0030: F7 F9 0A 4C 5C 65 F9 52 FD CC 29 8F DE 74 1B 63 ...L\e.R..)..t.c
0040: F6 .
},
},
"digital signature": {
"signature algorithm": "rsa_pkcs1_sha512"
"signature": {
0000: 18 F0 1B B5 20 8B CF DA 3F 6B 0B A6 0A 7D 2D AD .... ...?k....-.
0010: A9 B3 9D FB C0 7D 08 D5 26 1F 41 41 46 96 2A F6 ........&.AAF.*.
0020: F4 5D 53 A7 AD AF D1 8F DD F9 D2 5B 20 02 A2 EB .]S........[ ...
0030: 19 48 0A 61 7D 42 B1 8A 34 4C 79 46 46 A6 ED 9B .H.a.B..4LyFF...
0040: 1B D3 4D 67 02 66 8F 8B 04 A0 06 28 E9 8B 64 55 ..Mg.f.....(..dU
0050: CE D1 D2 08 39 AE 78 82 DF 33 DE D5 97 40 59 29 ....9.x..3...@Y)
0060: AB 01 67 ED E9 6B B6 81 AD 78 E5 98 9F FB CC 80 ..g..k...x......
0070: A8 4B 00 A1 22 D0 5A 25 06 68 5B A8 FB B7 6F 25 .K..".Z%.h[...o%
0080: D3 85 92 49 16 3E CE F3 71 E2 2B C6 9E 06 63 11 ...I.>..q.+...c.
0090: 42 0E 14 4E 36 AA 4D BB AA CA FC 34 10 3F B6 65 B..N6.M....4.?.e
00A0: B8 00 F7 25 49 6D 90 2D F2 A7 04 77 59 8F 44 84 ...%Im.-...wY.D.
00B0: FE E9 76 2C 21 1D 7B FB 9B 17 79 4F 17 C6 4D 56 ..v,!.....yO..MV
00C0: EF B9 D3 8C F1 12 C3 C3 77 06 0A BC F5 B0 54 8E ........w.....T.
00D0: DB E7 1F 77 8A DE 1D 6B 76 1A C0 86 17 E9 52 72 ...w...kv.....Rr
00E0: 4A EA 99 19 10 31 92 5A B9 97 FD 5D CA 72 76 9C J....1.Z...].rv.
00F0: 07 C3 BA C9 60 D1 22 5C 97 4B 3E C3 52 05 D1 E1 ....`."\.K>.R...
},
}
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.061 CEST|CertificateRequest.java:692|Consuming CertificateRequest handshake message (
"CertificateRequest": {
"certificate types": [rsa_sign, dss_sign, ecdsa_sign]
"supported signature algorithms": [rsa_pkcs1_sha512, dsa_sha512, ecdsa_secp521r1_sha512, rsa_pkcs1_sha384, dsa_sha384, ecdsa_secp384r1_sha384, rsa_pkcs1_sha256, dsa_sha256, ecdsa_secp256r1_sha256, rsa_sha224, dsa_sha224, ecdsa_sha224, rsa_pkcs1_sha1, dsa_sha1, ecdsa_sha1]
"certificate authorities": [CN=TEST AC RACINE IGC-SANTE FORT, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR, CN=TEST AC IGC-SANTE FORT PERSONNES, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR, CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR, CN=TEST AC RACINE IGC-SANTE ELEMENTAIRE, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR]
}
)
2022-10-12 12:00:39.065 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _hasSession() : true
2022-10-12 12:00:39.065 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _isLogged() : true
2022-10-12 12:00:39.065 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _readCertificates()
2022-10-12 12:00:39.068 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : Label du certificat CPS : Certificat de Signature CPS
2022-10-12 12:00:39.069 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : CPS certificat de signature trouvé.
2022-10-12 12:00:39.069 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : Label du certificat CPS : Certificat d'Authentification CPS
2022-10-12 12:00:39.069 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : CPS certificat d'Authentification trouvé.
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.069 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message (
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.070 CEST|CertificateMessage.java:330|Produced client Certificate handshake message (
"Certificates": [
"certificate" : {
"version" : "v3",
"serial number" : "63 DA FF CF C8 03 4B DC 4D BF 87 30 FA F3 4A 5F",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC IGC-SANTE FORT PERSONNES, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2020-12-15 14:06:40.000 CET",
"not after" : "2023-12-15 14:06:40.000 CET",
"subject" : "GIVENNAME=ANNE + CN=899700296140 + SURNAME=MED-CS RPPS0029614, T=Médecin, C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 1.2.250.1.71.1.2.2 Criticality=false
},
{
ObjectId: 1.2.250.1.71.1.2.3 Criticality=false
},
{
ObjectId: 1.2.250.1.71.1.2.5 Criticality=false
},
{
ObjectId: 1.2.250.1.71.1.2.7 Criticality=false
},
{
ObjectId: 1.2.250.1.71.4.2.5 Criticality=false
},
{
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: ocsp
accessLocation: URIName: http://ocsp.esante.gouv.fr
,
accessMethod: caIssuers
accessLocation: URIName: http://igc-sante.esante.gouv.fr/AC%20TEST/ACI-FO-PP-TEST.cer
]
]
},
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 3A F1 E7 F5 CE EB ED F7 8D C9 C9 B2 9F ED D4 65 :..............e
0010: 29 DC 1F FD )...
]
]
},
{
ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACI-FO-PP-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20FORT%20PERSONNES,ou=TEST%20AC%20RACINE%20IGC-SANTE%20FORT,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?certificaterevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [1.2.250.1.213.1.7.2.1.1.1.1]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
clientAuth
1.3.6.1.4.1.311.20.2.2
]
},
{
ObjectId: 2.5.29.46 Criticality=false
FreshestCRL [
[DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20FORT%20PERSONNES,ou=TEST%20AC%20RACINE%20IGC-SANTE%20FORT,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?deltarevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
]
},
{
ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
Other-Name: Unrecognized ObjectIdentifier: 1.3.6.1.4.1.311.20.2.3
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 53 3B C4 E9 E9 F0 AA D5 DA 26 9D 4E F5 97 41 BF S;.......&.N..A.
0010: EA 27 89 23 .'.#
]
]
}
]}
]
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.072 CEST|ECDHClientKeyExchange.java:409|Produced ECDHE ClientKeyExchange handshake message (
"ECDH ClientKeyExchange": {
"ecdh public": {
0000: 04 6B B7 95 73 33 2B 3A E4 BC 59 A7 B0 67 E1 6F .k..s3+:..Y..g.o
0010: B1 13 CD 9E 36 24 26 52 5C 5D D4 CF C2 C7 45 9C ....6$&R\]....E.
0020: 45 9C 07 E5 53 DB 5B 0A E2 42 3E EF 33 4E FA 01 E...S.[..B>.3N..
0030: 22 DF EF 6C 4F 98 AA D5 30 FC 2A AD F7 38 FA 08 "..lO...0.*..8..
0040: 60 `
},
}
)
2022-10-12 12:00:39.075 DEBUG 7092 --- [ main] f.d.cps.security.CpsOperationSignature : engineInitSign(fr.devboxsante.cps.security.CpsPrivateKey@3e8eea59)
2022-10-12 12:00:39.075 DEBUG 7092 --- [ main] f.d.cps.security.CpsOperationSignature : engineUpdate(7827, 0, 7827)
2022-10-12 12:00:39.075 DEBUG 7092 --- [ main] f.d.cps.security.CpsOperationSignature : engineSign(7827)
2022-10-12 12:00:39.077 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _hasSession() : true
2022-10-12 12:00:39.077 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : _isLogged() : true
2022-10-12 12:00:39.081 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : Label de la clé privé CPS : CPS_PRIV_SIG
2022-10-12 12:00:39.081 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : CPS clé privé de signature trouvé avec le label CPS_PRIV_SIG.
2022-10-12 12:00:39.081 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : Label de la clé privé CPS : CPS_PRIV_AUT
2022-10-12 12:00:39.081 DEBUG 7092 --- [ main] f.d.cps.internal.IAIKCpsFacadeImpl : CPS clé privé d’authentification trouvé avec le label CPS_PRIV_AUT.
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.732 CEST|CertificateVerify.java:764|Produced CertificateVerify handshake message (
"CertificateVerify": {
"signature algorithm": rsa_pkcs1_sha256
"signature": {
0000: 67 F0 F3 EB 18 F1 CF D2 4C A0 02 24 FD C2 E3 5F g.......L..$..._
0010: 37 62 FA 69 3C EB 01 CB 68 BD 8D 59 D0 14 F8 30 7b.i<...h..Y...0
0020: 8E 10 5E 53 24 7E 5C 3D 5E 85 72 23 9D E2 66 D0 ..^S$.\=^.r#..f.
0030: 06 9C 0E 90 14 B3 06 E5 0A 7F A0 B1 5A 96 C3 21 ............Z..!
0040: 04 C0 2F DB AD B5 AF 28 54 AD 66 0C 3E 17 DD 66 ../....(T.f.>..f
0050: 2D D2 18 31 B6 83 E5 B2 1D D8 55 24 BB 89 DA 72 -..1......U$...r
0060: 30 FB F9 B8 91 42 DB 72 DD D0 D6 DC 4B E5 DE 7E 0....B.r....K...
0070: 77 FD 2A A5 3B D2 16 A9 22 BA 19 7C 48 0A 02 70 w.*.;..."...H..p
0080: 1D A8 EF 19 8E B2 25 15 59 D7 58 F1 9A 20 44 B4 ......%.Y.X.. D.
0090: DE 98 69 41 F9 1D 2C 98 8A F0 E2 CB 1F C7 11 FA ..iA..,.........
00A0: 26 D6 D6 4B 85 E0 73 38 E6 BC F7 7E 3C 6E 28 ED &..K..s8....xt.....
00D0: 2A F7 0D CD 49 9F 64 E2 51 9A 89 62 50 FA 78 3F *...I.d.Q..bP.x?
00E0: DC 30 5B 6E 6A 47 C9 34 DD 7B 13 9F E3 D4 0B 92 .0[njG.4........
00F0: DE 18 CC 8E FA B1 B6 06 EF 14 2B 2B 9B 4A E8 8F ..........++.J..
}
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.733 CEST|ChangeCipherSpec.java:115|Produced ChangeCipherSpec message
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.733 CEST|Finished.java:398|Produced client Finished handshake message (
"Finished": {
"verify data": {
0000: 5A 09 AB A9 F9 3B D8 59 9C F8 B6 F2
}'}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.794 CEST|ChangeCipherSpec.java:149|Consuming ChangeCipherSpec message
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.796 CEST|Finished.java:535|Consuming server Finished handshake message (
"Finished": {
"verify data": {
0000: 01 9D 58 A4 6E 1A 61 EB 17 94 79 88
}'}
)
2022-10-12 12:00:39.956 DEBUG 7092 --- [ main] f.d.m.security.cps.CpsPAOSAuthenticator : http://localhost:8089/auth/realms/mssantehttp://localhost:8089/auth/realms/mssanteq3MhqJGDY42CG10FHROFurJPXm/Tc8PpSpOEa/L+w4k=gxmGF5bCyIzCtdvwGcC4lCswQyFDLwp7V+vM3M3/zX2UHbhvMw0Kd3JZiJ3ZTF7no3pdC0TyCj9U/31syi7MkIbkQPyGg1fU+2BEs8jZ/5sDv9EDGA+M59qR7Yu/h4eykUVdyUjr0e+RQ4ettQwJQX/fLWujMlzyPYIaTJdvTn3mLOEbUCbLm2QBjcts8YDUAIE6IdGc+rvRZGa2hcA2nbpJSA9C+hGabXjpBCq3unlM3oAyzzNxro6vWIvioTDeS9jpB476NXVUjb1pPMWr85dTE9KEbNsrEiQvwTIelGNeCNzCMOMTQMuSZRizFsgszPh1oXuNu2t4k1UqGYVedA==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nEe9MJT4oEOCY6uTOUeMohOVGgJYaxyWbcwVnngU5imjEH5q1JuxtYLdwnsb3tBN57RVVT8mRTWOUp1ypilzEolA1It6jkZUHrzbNv8AP5sKJB01TwOkbMlf/UfImwDQMojBoScjh+877ZaXa1U7lk2aUP1Vf2kY3OsJSxSsLfeqGwajJq7ory3kr3vYNYMcKAMLfXIafnjRpom7RbYH+QYCZrsHdbaeC1pGjpeyZwrAkltzkyUSzqU2f9dmOaC6OyBgstki7mGY7cFVPbHBRzcuLvejP5wVzfyd4zzebca+1FtFjoiR5+g/VermHJlLRRVNKV238p3e30ORFHTYfw==AQAB899700296140mss-msg-services-igcsanteurn:oasis:names:tc:SAML:2.0:ac:classes:unspecifiedMED-CS RPPS0029614899700296140MédecinANNE
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.992 CEST|Utilities.java:73|the previous server name in SNI (type=host_name (0), value=mss-msg-igcsante.formation.mssante.fr) was replaced with (type=host_name (0), value=mss-msg-igcsante.formation.mssante.fr)
javax.net.ssl|INFO|01|main|2022-10-12 12:00:39.995 CEST|AlpnExtension.java:178|No available application protocols
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.995 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.995 CEST|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:39.996 CEST|ClientHello.java:653|Produced ClientHello handshake message (
"ClientHello": {
"client version" : "TLSv1.2",
"random" : "2B DC 37 76 3D D7 54 D8 4B 52 E6 3D EB 40 E1 E4 99 22 A4 BD A7 4F 4C FD 80 25 EE 11 3D F0 5E 09",
"session id" : "",
"cipher suites" : "[TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA(0xC00A), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xC014), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA(0xC009), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xC013), TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x0039), TLS_DHE_DSS_WITH_AES_256_CBC_SHA(0x0038), TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x0033), TLS_DHE_DSS_WITH_AES_128_CBC_SHA(0x0032), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA(0xC005), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA(0xC00F), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA(0xC004), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA(0xC00E), TLS_RSA_WITH_AES_256_GCM_SHA384(0x009D), TLS_RSA_WITH_AES_128_GCM_SHA256(0x009C), TLS_RSA_WITH_AES_256_CBC_SHA256(0x003D), TLS_RSA_WITH_AES_128_CBC_SHA256(0x003C), TLS_RSA_WITH_AES_256_CBC_SHA(0x0035), TLS_RSA_WITH_AES_128_CBC_SHA(0x002F), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
"compression methods" : "00",
"extensions" : [
"server_name (0)": {
type=host_name (0), value=mss-msg-igcsante.formation.mssante.fr
},
"status_request (5)": {
"certificate status type": ocsp
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
},
"supported_groups (10)": {
"versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
},
"ec_point_formats (11)": {
"formats": [uncompressed]
},
"signature_algorithms (13)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"signature_algorithms_cert (50)": {
"signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
},
"status_request_v2 (17)": {
"cert status request": {
"certificate status type": ocsp_multi
"OCSP status request": {
"responder_id":
"request extensions": {
}
}
}
},
"extended_master_secret (23)": {
},
"supported_versions (43)": {
"versions": [TLSv1.2]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|ServerHello.java:872|Consuming ServerHello handshake message (
"ServerHello": {
"server version" : "TLSv1.2",
"random" : "6A 05 3C 64 DA 86 FF 9B 39 E8 78 44 F2 61 FE 5F A7 10 46 3C 36 27 EF 0D AD 11 BF F0 48 CD D1 FD",
"session id" : "85 E4 0B F8 0E 8B 73 82 0B 52 BB 06 31 9D 35 4A 47 A0 9A 19 9C 5A C4 86 43 C0 A3 E2 7F EE 49 9E",
"cipher suite" : "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030)",
"compression methods" : "00",
"extensions" : [
"renegotiation_info (65,281)": {
"renegotiated connection": []
},
"ec_point_formats (11)": {
"formats": [uncompressed, ansiX962_compressed_prime, ansiX962_compressed_char2]
}
]
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:173|Ignore unavailable extension: supported_versions
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|ServerHello.java:968|Negotiated protocol version: TLSv1.2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:173|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:192|Consumed extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:173|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:192|Consumed extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:207|Ignore unavailable extension: server_name
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.072 CEST|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.073 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:40.073 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: ec_point_formats
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.073 CEST|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.073 CEST|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.073 CEST|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
javax.net.ssl|WARNING|01|main|2022-10-12 12:00:40.073 CEST|SSLExtensions.java:215|Ignore impact of unsupported extension: renegotiation_info
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.074 CEST|CertificateMessage.java:366|Consuming server Certificate handshake message (
"Certificates": [
"certificate" : {
"version" : "v3",
"serial number" : "1D 5D E2 5E 3D C1 4B DE 21 0F 2C 0F 23 0E 86 52",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2022-06-02 13:49:28.000 CEST",
"not after" : "2024-06-02 13:49:28.000 CEST",
"subject" : "CN=mss-msg-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 1.2.250.1.71.1.2.5 Criticality=false
},
{
ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: ocsp
accessLocation: URIName: http://ocsp.esante.gouv.fr
,
accessMethod: caIssuers
accessLocation: URIName: http://igc-sante.esante.gouv.fr/AC%20TEST/ACI-EL-ORG-TEST.cer
]
]
},
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
},
{
ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACI-EL-ORG-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?certificaterevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [1.2.250.1.213.1.7.2.1.1.1.1]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
clientAuth
]
},
{
ObjectId: 2.5.29.46 Criticality=false
FreshestCRL [
[DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/cn=TEST%20AC%20IGC-SANTE%20ELEMENTAIRE%20ORGANISATIONS,ou=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,ou=IGC-SANTE%20TEST,ou=0002%20187512751,o=ASIP-SANTE,c=FR?deltarevocationlist;binary?base?objectClass=pkiCA]
]]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
DigitalSignature
Key_Encipherment
]
},
{
ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: mss-msg-igcsante.formation.mssante.fr
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 7C C2 8A BF AB F2 40 56 48 DD 78 75 9B A6 42 F9 ......@VH.xu..B.
0010: 04 05 4D D4 ..M.
]
]
}
]},
"certificate" : {
"version" : "v3",
"serial number" : "11 20 61 F3 C6 E8 4F C2 EF B1 8B F5 25 8E 1D EB 4E C6",
"signature algorithm": "SHA256withRSA",
"issuer" : "CN=TEST AC RACINE IGC-SANTE ELEMENTAIRE, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"not before" : "2013-06-25 02:00:00.000 CEST",
"not after" : "2033-06-24 02:00:00.000 CEST",
"subject" : "CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR",
"subject public key" : "RSA",
"extensions" : [
{
ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: 9C AD 86 BB A6 AA CA C5 61 3A 04 B0 47 FD DC 3B ........a:..G..;
0010: CD 3D 57 F4 .=W.
]
]
},
{
ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:0
]
},
{
ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://igc-sante.esante.gouv.fr/CRL/ACR-EL-TEST.crl]
, DistributionPoint:
[URIName: ldap://annuaire-igc.esante.gouv.fr/CN=TEST%20AC%20RACINE%20IGC-SANTE%20ELEMENTAIRE,OU=IGC-SANTE%20TEST,OU=0002%20187512751,O=ASIP-SANTE,C=FR?certificaterevocationlist;binary?base?objectclass=pkiCa]
]]
},
{
ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.5.29.32.0]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 29 68 74 74 70 3A 2F 2F 69 67 63 2D 73 61 6E .)http://igc-san
0010: 74 65 2E 65 73 61 6E 74 65 2E 67 6F 75 76 2E 66 te.esante.gouv.f
0020: 72 2F 50 43 25 32 30 54 45 53 54 r/PC%20TEST
]] ]
]
},
{
ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
Key_CertSign
Crl_Sign
]
},
{
ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 21 2E 84 7D 3B 1E F5 12 DE 51 A2 21 5C AE 93 A8 !...;....Q.!\...
0010: EF 5B E3 F5 .[..
]
]
}
]}
]
)
2022-10-12 12:00:40.075 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=mss-msg-igcsante.formation.mssante.fr, OU=300000000099622, O=GIP - TEST9962, ST=Paris (75), C=FR) est : Sun Jun 02 13:49:28 CEST 2024
2022-10-12 12:00:40.075 DEBUG 7092 --- [ main] f.d.igcsante.IGCSanteTrustoreManager : Date expiration du certificat (CN=TEST AC IGC-SANTE ELEMENTAIRE ORGANISATIONS, OU=IGC-SANTE TEST, OU=0002 187512751, O=ASIP-SANTE, C=FR) est : Fri Jun 24 02:00:00 CEST 2033
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.076 CEST|ECDHServerKeyExchange.java:523|Consuming ECDH ServerKeyExchange handshake message (
"ECDH ServerKeyExchange": {
"parameters": {
"named group": "secp256r1"
"ecdh public": {
0000: 04 F1 FA BD BA B6 D8 89 D2 C4 8C 8F FE 2E E2 46 ...............F
0010: F0 DB 05 99 CB CF 80 37 02 7A 52 14 02 59 27 35 .......7.zR..Y'5
0020: 97 63 77 88 31 BE 16 6B 65 19 3D 5F 97 9C C4 80 .cw.1..ke.=_....
0030: 9F 43 7D 42 1D 24 D6 AB B3 60 58 2D B0 3A 0E E7 .C.B.$...`X-.:..
0040: 40 @
},
},
"digital signature": {
"signature algorithm": "rsa_pkcs1_sha512"
"signature": {
0000: BF 26 BF 3E 30 D7 F2 87 79 4E 1F 6E AF 17 9C EE .&.>0...yN.n....
0010: 20 68 65 A8 A1 D7 F5 BF C2 1A 3C 34 7C 3B C3 5E he.......<4.;.^
0020: 85 E0 11 DF C8 1F 77 AA 08 A0 E1 B6 1E 92 3D 08 ......w.......=.
0030: C8 12 DD 83 84 A5 A8 98 B1 33 CA C9 36 15 BF B9 .........3..6...
0040: 11 EF BF A4 A5 02 A5 CA 71 E9 EC D1 3E 3E 65 7E ........q...>>e.
0050: 19 4A 14 CE 34 BA E2 1E A6 97 FD 68 FB EE 9C 77 .J..4......h...w
0060: 69 82 EF 8A EA 94 5F 16 FB A6 89 24 64 BA 28 E3 i....._....$d.(.
0070: 0B B7 17 43 99 51 8C E4 86 3A 6E 09 61 1D 1E 5F ...C.Q...:n.a.._
0080: 0A FB 11 5B 3E 8A 0E B6 6D A7 59 8C EA E7 34 B9 ...[>...m.Y...4.
0090: 2C C8 73 EF E6 8A 93 7B 76 FF C5 F4 3D 9A 8F B2 ,.s.....v...=...
00A0: 8D B3 33 5F 0E 6C 6A 40 26 60 8F D4 59 FC 83 D8 ..3_.lj@&`..Y...
00B0: 11 30 0B 4B 32 F7 68 38 6E FF 6E C7 05 E9 1D 29 .0.K2.h8n.n....)
00C0: E9 51 6B F9 0E 66 25 65 99 2C 29 8A E2 B5 DE D4 .Qk..f%e.,).....
00D0: 63 4C 5A 34 AA 30 B1 48 8F 59 E5 B2 3E 9A 69 D4 cLZ4.0.H.Y..>.i.
00E0: 2C DC 15 27 A8 23 66 10 56 3C 90 8E 61 FB 22 E3 ,..'.#f.V<..a.".
00F0: 33 68 FB 92 39 D6 6B AC A7 2E FE 9A C3 22 2E 81 3h..9.k......"..
},
}
}
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.077 CEST|ServerHelloDone.java:151|Consuming ServerHelloDone handshake message (
)
javax.net.ssl|DEBUG|01|main|2022-10-12 12:00:40.077 CEST|ECDHClientKeyExchange.java:409|Produced ECDHE ClientKeyExchange handshake message (
"ECDH ClientKeyExchange": {
"ecdh public": {
0000: 04 A9 37 68 DF D0 BB B5 A0 73 98 39 29 53 BA BD ..7h.....s.9)S..
0010: 33 78 33 74 35 A8 CC 3C 56 80 0B 25 FA 55 96 D1 3x3t5..http://services.msg.mss.asip.fr/AnnuaireService/listEmailsurn:uuid:e751f6f0-0fbc-4c0e-90ad-6c5b98f82ed6https://mss-msg-igcsante.formation.mssante.fr/mss-msg-services/services/Annuaire/soap/v1/listEmailshttp://www.w3.org/2005/08/addressing/anonymous899700296140
2022-10-12 12:00:40.324 WARN 7092 --- [ main] o.a.cxf.ws.addressing.soap.MAPCodec : Response message does not contain WS-Addressing properties. Not correlating response.
2022-10-12 12:00:40.332 WARN 7092 --- [ main] o.apache.cxf.ws.addressing.ContextUtils : WS-Addressing - failed to retrieve Message Addressing Properties from context
2022-10-12 12:00:40.332 INFO 7092 --- [ main] o.a.c.services.AnnuaireService.RESP_IN : RESP_IN
Address: https://mss-msg-igcsante.formation.mssante.fr/mss-msg-services/services/Annuaire/soap/v1/listEmails
Content-Type: text/xml;charset=UTF-8
ResponseCode: 200
ExchangeId: 5c706d64-0f58-47ed-a55e-ff0dd3ef47e8
ServiceName: AnnuaireServiceService
PortName: AnnuaireServicePort
PortTypeName: AnnuaireService
Headers: {Keep-Alive=timeout=15, max=99, Server=Apache, X-Content-Type-Options=nosniff, Pragma=no-cache, Date=Wed, 12 Oct 2022 10:00:40 GMT, X-Frame-Options=DENY, Strict-Transport-Security=max-age=31536000 ; includeSubDomains, Cache-Control=no-cache, no-store, max-age=0, must-revalidate, connection=Keep-Alive, content-type=text/xml;charset=UTF-8, Set-Cookie=[ROUTEID=.MOB_1; path=/; DOMAIN=.formation.mssante.fr, SessionStatId=aee6acdf.5ead377125fb7; path=/; expires=Thu, 10-Oct-30 10:00:40 GMT; domain=.mss.sii.local], Vary=Accept-Encoding, Expires=0, Content-Length=271, X-XSS-Protection=1; mode=block}
Payload: anne.med-csrpps0029614@medecin.formation.mssante.fr
2022-10-12 12:00:40.333 INFO 7092 --- [ main] f.d.mssante.paos.PAOSTargetSelector : FAILOVER_NOT_REQUIRED