By type
2021-11-18 06:10:53 5.11.2 INFO logger level is INFO, change using:
- 'ConfigurationProperties.logLevel(String level)' in Java code,
- '-logLevel' command line argument,
- 'mockserver.logLevel' JVM system property or,
- 'mockserver.logLevel' property value in 'mockserver.properties'
2021-11-18 06:10:53 5.11.2 INFO 1080 started on port: 1080
2021-11-18 06:31:22 5.11.2 INFO received request:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
2021-11-18 06:31:22 5.11.2 INFO no expectation for:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:31:22 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
2021-11-18 06:31:22 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:31:22 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : false
}
2021-11-18 06:31:22 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : false
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:31:27 5.11.2 INFO received binary request:
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:31:27 5.11.2 INFO unknown message format
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:31:27 5.11.2 INFO received binary request:
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:31:27 5.11.2 INFO unknown message format
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:31:27 5.11.2 INFO received binary request:
000c000010000000000000000000
2021-11-18 06:31:27 5.11.2 INFO unknown message format
000c000010000000000000000000
2021-11-18 06:31:35 5.11.2 SEVERE TSL handshake failure while a client attempted to connect to [id: 0x0d98a868, L:0.0.0.0/0.0.0.0:1080]
io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 is not enabled or supported in server context
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:471)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
at io.netty.handler.codec.ByteToMessageDecoder.handlerRemoved(ByteToMessageDecoder.java:253)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:508)
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:440)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)
at org.mockserver.netty.unification.PortUnificationHandler.enableTls(PortUnificationHandler.java:201)
at org.mockserver.netty.unification.PortUnificationHandler.decode(PortUnificationHandler.java:135)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:501)
at io.netty.handler.codec.ReplayingDecoder.callDecode(ReplayingDecoder.java:366)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)
at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)
at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714)
at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650)
at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576)
at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)
at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
at java.base/java.lang.Thread.run(Thread.java:834)
Caused by: javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 is not enabled or supported in server context
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:307)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:263)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:254)
at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.negotiateProtocol(ClientHello.java:883)
at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.onClientHello(ClientHello.java:835)
at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.consume(ClientHello.java:813)
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1048)
at java.base/java.security.AccessController.doPrivileged(Native Method)
at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:995)
at io.netty.handler.ssl.SslHandler.runAllDelegatedTasks(SslHandler.java:1557)
at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1571)
at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1455)
at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1282)
at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1329)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:501)
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:440)
... 35 more
2021-11-18 06:31:47 5.11.2 INFO received request:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
2021-11-18 06:31:47 5.11.2 INFO no expectation for:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:31:47 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
2021-11-18 06:31:47 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:31:47 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : true
}
2021-11-18 06:31:47 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:31:52 5.11.2 INFO received binary request:
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:31:52 5.11.2 INFO unknown message format
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:31:52 5.11.2 INFO received binary request:
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:31:52 5.11.2 INFO unknown message format
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:31:52 5.11.2 INFO received binary request:
000c000010000000000000000000
2021-11-18 06:31:52 5.11.2 INFO unknown message format
000c000010000000000000000000
2021-11-18 06:31:59 5.11.2 INFO received binary request:
0300002a25e00000000000436f6f6b69653a206d737473686173683d6e6d61700d0a0100080003000000
2021-11-18 06:31:59 5.11.2 INFO unknown message format
0300002a25e00000000000436f6f6b69653a206d737473686173683d6e6d61700d0a0100080003000000
2021-11-18 06:31:59 5.11.2 INFO received binary request:
000000716a816e30816ba103020105a20302010aa4815e305ca00703050050800010a2041b024e4da3173015a003020100a10e300c1b066b72627467741b024e4da511180f31393730303130313030303030305aa70602041f1eb9d9a8173015020112020111020110020117020101020103020102
2021-11-18 06:31:59 5.11.2 INFO unknown message format
000000716a816e30816ba103020105a20302010aa4815e305ca00703050050800010a2041b024e4da3173015a003020100a10e300c1b066b72627467741b024e4da511180f31393730303130313030303030305aa70602041f1eb9d9a8173015020112020111020110020117020101020103020102
2021-11-18 06:31:59 5.11.2 INFO received binary request:
000000a4ff534d4272000000000801400000000000000000000000000000400600000100008100025043204e4554574f524b2050524f4752414d20312e3000024d4943524f534f4654204e4554574f524b5320312e303300024d4943524f534f4654204e4554574f524b5320332e3000024c414e4d414e312e3000024c4d312e3258303032000253616d626100024e54204c414e4d414e20312e3000024e54204c4d20302e313200
2021-11-18 06:31:59 5.11.2 INFO unknown message format
000000a4ff534d4272000000000801400000000000000000000000000000400600000100008100025043204e4554574f524b2050524f4752414d20312e3000024d4943524f534f4654204e4554574f524b5320312e303300024d4943524f534f4654204e4554574f524b5320332e3000024c414e4d414e312e3000024c4d312e3258303032000253616d626100024e54204c414e4d414e20312e3000024e54204c4d20302e313200
2021-11-18 06:31:59 5.11.2 INFO received binary request:
6c000b000000000000000000
2021-11-18 06:31:59 5.11.2 INFO unknown message format
6c000b000000000000000000
2021-11-18 06:31:59 5.11.2 INFO received request:
{
"method" : "GET",
"path" : "/nice%20ports%2C/Tri%6Eity.txt%2ebak",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
2021-11-18 06:31:59 5.11.2 INFO no expectation for:
{
"method" : "GET",
"path" : "/nice%20ports%2C/Tri%6Eity.txt%2ebak",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:32:00 5.11.2 INFO received binary request:
0164656661756c740a
2021-11-18 06:32:00 5.11.2 INFO unknown message format
0164656661756c740a
2021-11-18 06:32:00 5.11.2 INFO received binary request:
30840000002d02010763840000002404000a01000a0100020100020164010100870b6f626a656374436c617373308400000000
2021-11-18 06:32:00 5.11.2 INFO unknown message format
30840000002d02010763840000002404000a01000a0100020100020164010100870b6f626a656374436c617373308400000000
2021-11-18 06:32:00 5.11.2 INFO received binary request:
300c020101600702010204008000
2021-11-18 06:32:00 5.11.2 INFO unknown message format
300c020101600702010204008000
2021-11-18 06:32:00 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "sip:nm",
"headers" : {
"Via" : [ "SIP/2.0/TCP nm;branch=foo" ],
"From" : [ ";tag=root" ],
"To" : [ "" ],
"Call-ID" : [ "50000" ],
"CSeq" : [ "42 OPTIONS" ],
"Max-Forwards" : [ "70" ],
"Content-Length" : [ "0" ],
"Contact" : [ "" ],
"Accept" : [ "application/sdp" ]
},
"keepAlive" : true,
"secure" : true
}
2021-11-18 06:32:00 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "sip:nm",
"headers" : {
"Via" : [ "SIP/2.0/TCP nm;branch=foo" ],
"From" : [ ";tag=root" ],
"To" : [ "" ],
"Call-ID" : [ "50000" ],
"CSeq" : [ "42 OPTIONS" ],
"Max-Forwards" : [ "70" ],
"Content-Length" : [ "0" ],
"Contact" : [ "" ],
"Accept" : [ "application/sdp" ]
},
"keepAlive" : true,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:32:07 5.11.2 INFO received binary request:
544e4d5004000000544e4d4500000400
2021-11-18 06:32:07 5.11.2 INFO unknown message format
544e4d5004000000544e4d4500000400
2021-11-18 06:32:07 5.11.2 INFO received binary request:
0300000b06e00000000000
2021-11-18 06:32:07 5.11.2 INFO unknown message format
0300000b06e00000000000
2021-11-18 06:32:07 5.11.2 INFO received binary request:
446d6454000000170000000100000000111100ff01ff13
2021-11-18 06:32:07 5.11.2 INFO unknown message format
446d6454000000170000000100000000111100ff01ff13
2021-11-18 06:32:07 5.11.2 INFO received binary request:
3a0000002f00000002000040020f0001003d050000000000000000000000002f000000000000000000401f0000000000000000000000000000000000
2021-11-18 06:32:07 5.11.2 INFO unknown message format
3a0000002f00000002000040020f0001003d050000000000000000000000002f000000000000000000401f0000000000000000000000000000000000
2021-11-18 06:32:12 5.11.2 INFO received binary request:
010000fdcefa0bb0a00000004d4d53140000000000000000000000000000001200000001000300f0f0f0f00b0004001c0003004e00530050006c0061007900650072002f0039002e0030002e0030002e0032003900380030003b0020007b00300030003000300041004100300030002d0030004100300030002d0030003000610030002d0041004100300041002d003000300030003000410030004100410030004100410030007d000000e06ddf5f
2021-11-18 06:32:12 5.11.2 INFO unknown message format
010000fdcefa0bb0a00000004d4d53140000000000000000000000000000001200000001000300f0f0f0f00b0004001c0003004e00530050006c0061007900650072002f0039002e0030002e0030002e0032003900380030003b0020007b00300030003000300041004100300030002d0030004100300030002d0030003000610030002d0041004100300041002d003000300030003000410030004100410030004100410030007d000000e06ddf5f
2021-11-18 06:32:12 5.11.2 INFO received binary request:
005a0000010000000136012c000008007fff7f08000000010020003a0000000000000000000000000000000034e600000001000000000000000028434f4e4e4543545f444154413d28434f4d4d414e443d76657273696f6e2929
2021-11-18 06:32:12 5.11.2 INFO unknown message format
005a0000010000000136012c000008007fff7f08000000010020003a0000000000000000000000000000000034e600000001000000000000000028434f4e4e4543545f444154413d28434f4d4d414e443d76657273696f6e2929
2021-11-18 06:32:12 5.11.2 INFO received binary request:
1201003400000000000015000601001b000102001c000c0300280004ff080001550000004d5353514c53657276657200480f0000
2021-11-18 06:32:12 5.11.2 INFO unknown message format
1201003400000000000015000601001b000102001c000c0300280004ff080001550000004d5353514c53657276657200480f0000
2021-11-18 06:32:12 5.11.2 INFO received binary request:
000300010000000000000002000000000f00
2021-11-18 06:32:12 5.11.2 INFO unknown message format
000300010000000000000002000000000f00
2021-11-18 06:32:12 5.11.2 INFO received binary request:
47494f500100010024000000000000000100000001000000060000006162636465660000040000006765740000000000
2021-11-18 06:32:12 5.11.2 INFO unknown message format
47494f500100010024000000000000000100000001000000060000006162636465660000040000006765740000000000
2021-11-18 06:32:20 5.11.2 INFO received binary request:
8000002825031d8a0000000000000002000186a0000000020000000000000000000000000000000000000000
2021-11-18 06:32:20 5.11.2 INFO unknown message format
8000002825031d8a0000000000000002000186a0000000020000000000000000000000000000000000000000
2021-11-18 06:34:55 5.11.2 INFO received request:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
2021-11-18 06:34:55 5.11.2 INFO no expectation for:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:34:55 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
2021-11-18 06:34:55 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : false
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:34:55 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : false
}
2021-11-18 06:34:55 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : false
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:35:00 5.11.2 INFO received binary request:
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:35:00 5.11.2 INFO unknown message format
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:35:00 5.11.2 INFO received binary request:
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:35:00 5.11.2 INFO unknown message format
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:35:00 5.11.2 INFO received binary request:
000c000010000000000000000000
2021-11-18 06:35:00 5.11.2 INFO unknown message format
000c000010000000000000000000
2021-11-18 06:35:08 5.11.2 SEVERE TSL handshake failure while a client attempted to connect to [id: 0xe7681712, L:0.0.0.0/0.0.0.0:1080]
io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 is not enabled or supported in server context
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:471)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
at io.netty.handler.codec.ByteToMessageDecoder.handlerRemoved(ByteToMessageDecoder.java:253)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:508)
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:440)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)
at org.mockserver.netty.unification.PortUnificationHandler.enableTls(PortUnificationHandler.java:201)
at org.mockserver.netty.unification.PortUnificationHandler.decode(PortUnificationHandler.java:135)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:501)
at io.netty.handler.codec.ReplayingDecoder.callDecode(ReplayingDecoder.java:366)
at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:276)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:357)
at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:379)
at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:365)
at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919)
at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166)
at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:714)
at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:650)
at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:576)
at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:493)
at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:989)
at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74)
at java.base/java.lang.Thread.run(Thread.java:834)
Caused by: javax.net.ssl.SSLHandshakeException: Client requested protocol SSLv3 is not enabled or supported in server context
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:307)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:263)
at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:254)
at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.negotiateProtocol(ClientHello.java:883)
at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.onClientHello(ClientHello.java:835)
at java.base/sun.security.ssl.ClientHello$ClientHelloConsumer.consume(ClientHello.java:813)
at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1048)
at java.base/java.security.AccessController.doPrivileged(Native Method)
at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:995)
at io.netty.handler.ssl.SslHandler.runAllDelegatedTasks(SslHandler.java:1557)
at io.netty.handler.ssl.SslHandler.runDelegatedTasks(SslHandler.java:1571)
at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1455)
at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1282)
at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1329)
at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:501)
at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:440)
... 35 more
2021-11-18 06:35:19 5.11.2 INFO received request:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
2021-11-18 06:35:19 5.11.2 INFO no expectation for:
{
"method" : "GET",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:35:19 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
2021-11-18 06:35:19 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:35:19 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : true
}
2021-11-18 06:35:19 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "/",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : true,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:35:24 5.11.2 INFO received binary request:
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:35:24 5.11.2 INFO unknown message format
8000002872fe1d130000000000000002000186a00001977c0000000000000000000000000000000000000000
2021-11-18 06:35:24 5.11.2 INFO received binary request:
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:35:24 5.11.2 INFO unknown message format
001e0006010000010000000000000776657273696f6e0462696e640000100003
2021-11-18 06:35:24 5.11.2 INFO received binary request:
000c000010000000000000000000
2021-11-18 06:35:24 5.11.2 INFO unknown message format
000c000010000000000000000000
2021-11-18 06:35:32 5.11.2 INFO received binary request:
0300002a25e00000000000436f6f6b69653a206d737473686173683d6e6d61700d0a0100080003000000
2021-11-18 06:35:32 5.11.2 INFO unknown message format
0300002a25e00000000000436f6f6b69653a206d737473686173683d6e6d61700d0a0100080003000000
2021-11-18 06:35:32 5.11.2 INFO received binary request:
000000716a816e30816ba103020105a20302010aa4815e305ca00703050050800010a2041b024e4da3173015a003020100a10e300c1b066b72627467741b024e4da511180f31393730303130313030303030305aa70602041f1eb9d9a8173015020112020111020110020117020101020103020102
2021-11-18 06:35:32 5.11.2 INFO unknown message format
000000716a816e30816ba103020105a20302010aa4815e305ca00703050050800010a2041b024e4da3173015a003020100a10e300c1b066b72627467741b024e4da511180f31393730303130313030303030305aa70602041f1eb9d9a8173015020112020111020110020117020101020103020102
2021-11-18 06:35:32 5.11.2 INFO received binary request:
000000a4ff534d4272000000000801400000000000000000000000000000400600000100008100025043204e4554574f524b2050524f4752414d20312e3000024d4943524f534f4654204e4554574f524b5320312e303300024d4943524f534f4654204e4554574f524b5320332e3000024c414e4d414e312e3000024c4d312e3258303032000253616d626100024e54204c414e4d414e20312e3000024e54204c4d20302e313200
2021-11-18 06:35:32 5.11.2 INFO unknown message format
000000a4ff534d4272000000000801400000000000000000000000000000400600000100008100025043204e4554574f524b2050524f4752414d20312e3000024d4943524f534f4654204e4554574f524b5320312e303300024d4943524f534f4654204e4554574f524b5320332e3000024c414e4d414e312e3000024c4d312e3258303032000253616d626100024e54204c414e4d414e20312e3000024e54204c4d20302e313200
2021-11-18 06:35:32 5.11.2 INFO received binary request:
6c000b000000000000000000
2021-11-18 06:35:32 5.11.2 INFO unknown message format
6c000b000000000000000000
2021-11-18 06:35:32 5.11.2 INFO received request:
{
"method" : "GET",
"path" : "/nice%20ports%2C/Tri%6Eity.txt%2ebak",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
2021-11-18 06:35:32 5.11.2 INFO no expectation for:
{
"method" : "GET",
"path" : "/nice%20ports%2C/Tri%6Eity.txt%2ebak",
"headers" : {
"content-length" : [ "0" ]
},
"keepAlive" : false,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:35:32 5.11.2 INFO received binary request:
0164656661756c740a
2021-11-18 06:35:32 5.11.2 INFO unknown message format
0164656661756c740a
2021-11-18 06:35:32 5.11.2 INFO received binary request:
30840000002d02010763840000002404000a01000a0100020100020164010100870b6f626a656374436c617373308400000000
2021-11-18 06:35:32 5.11.2 INFO unknown message format
30840000002d02010763840000002404000a01000a0100020100020164010100870b6f626a656374436c617373308400000000
2021-11-18 06:35:32 5.11.2 INFO received binary request:
300c020101600702010204008000
2021-11-18 06:35:32 5.11.2 INFO unknown message format
300c020101600702010204008000
2021-11-18 06:35:32 5.11.2 INFO received request:
{
"method" : "OPTIONS",
"path" : "sip:nm",
"headers" : {
"Via" : [ "SIP/2.0/TCP nm;branch=foo" ],
"From" : [ ";tag=root" ],
"To" : [ "" ],
"Call-ID" : [ "50000" ],
"CSeq" : [ "42 OPTIONS" ],
"Max-Forwards" : [ "70" ],
"Content-Length" : [ "0" ],
"Contact" : [ "" ],
"Accept" : [ "application/sdp" ]
},
"keepAlive" : true,
"secure" : true
}
2021-11-18 06:35:32 5.11.2 INFO no expectation for:
{
"method" : "OPTIONS",
"path" : "sip:nm",
"headers" : {
"Via" : [ "SIP/2.0/TCP nm;branch=foo" ],
"From" : [ ";tag=root" ],
"To" : [ "" ],
"Call-ID" : [ "50000" ],
"CSeq" : [ "42 OPTIONS" ],
"Max-Forwards" : [ "70" ],
"Content-Length" : [ "0" ],
"Contact" : [ "" ],
"Accept" : [ "application/sdp" ]
},
"keepAlive" : true,
"secure" : true
}
returning response:
{
"statusCode" : 404,
"reasonPhrase" : "Not Found"
}
2021-11-18 06:35:39 5.11.2 INFO received binary request:
544e4d5004000000544e4d4500000400
2021-11-18 06:35:39 5.11.2 INFO unknown message format
544e4d5004000000544e4d4500000400
2021-11-18 06:35:39 5.11.2 INFO received binary request:
0300000b06e00000000000
2021-11-18 06:35:39 5.11.2 INFO unknown message format
0300000b06e00000000000
2021-11-18 06:35:39 5.11.2 INFO received binary request:
446d6454000000170000000100000000111100ff01ff13
2021-11-18 06:35:39 5.11.2 INFO unknown message format
446d6454000000170000000100000000111100ff01ff13
2021-11-18 06:35:39 5.11.2 INFO received binary request:
3a0000002f00000002000040020f0001003d050000000000000000000000002f000000000000000000401f0000000000000000000000000000000000
2021-11-18 06:35:39 5.11.2 INFO unknown message format
3a0000002f00000002000040020f0001003d050000000000000000000000002f000000000000000000401f0000000000000000000000000000000000
2021-11-18 06:35:45 5.11.2 INFO received binary request:
010000fdcefa0bb0a00000004d4d53140000000000000000000000000000001200000001000300f0f0f0f00b0004001c0003004e00530050006c0061007900650072002f0039002e0030002e0030002e0032003900380030003b0020007b00300030003000300041004100300030002d0030004100300030002d0030003000610030002d0041004100300041002d003000300030003000410030004100410030004100410030007d000000e06ddf5f
2021-11-18 06:35:45 5.11.2 INFO unknown message format
010000fdcefa0bb0a00000004d4d53140000000000000000000000000000001200000001000300f0f0f0f00b0004001c0003004e00530050006c0061007900650072002f0039002e0030002e0030002e0032003900380030003b0020007b00300030003000300041004100300030002d0030004100300030002d0030003000610030002d0041004100300041002d003000300030003000410030004100410030004100410030007d000000e06ddf5f
2021-11-18 06:35:45 5.11.2 INFO received binary request:
005a0000010000000136012c000008007fff7f08000000010020003a0000000000000000000000000000000034e600000001000000000000000028434f4e4e4543545f444154413d28434f4d4d414e443d76657273696f6e2929
2021-11-18 06:35:45 5.11.2 INFO unknown message format
005a0000010000000136012c000008007fff7f08000000010020003a0000000000000000000000000000000034e600000001000000000000000028434f4e4e4543545f444154413d28434f4d4d414e443d76657273696f6e2929
2021-11-18 06:35:45 5.11.2 INFO received binary request:
1201003400000000000015000601001b000102001c000c0300280004ff080001550000004d5353514c53657276657200480f0000
2021-11-18 06:35:45 5.11.2 INFO unknown message format
1201003400000000000015000601001b000102001c000c0300280004ff080001550000004d5353514c53657276657200480f0000
2021-11-18 06:35:45 5.11.2 INFO received binary request:
000300010000000000000002000000000f00
2021-11-18 06:35:45 5.11.2 INFO unknown message format
000300010000000000000002000000000f00
2021-11-18 06:35:45 5.11.2 INFO received binary request:
47494f500100010024000000000000000100000001000000060000006162636465660000040000006765740000000000
2021-11-18 06:35:45 5.11.2 INFO unknown message format
47494f500100010024000000000000000100000001000000060000006162636465660000040000006765740000000000
2021-11-18 06:35:52 5.11.2 INFO received binary request:
8000002828e5e1800000000000000002000186a0000000020000000000000000000000000000000000000000
2021-11-18 06:35:52 5.11.2 INFO unknown message format
8000002828e5e1800000000000000002000186a0000000020000000000000000000000000000000000000000