0% found this document useful (0 votes)
145 views4 pages

Smicm Trace

The document contains log entries from an ICM trace file. It records errors from failed SSL handshakes and connection attempts. Specific errors mentioned are SSL_READ, NIEHOST_UNKNOWN, and WSAEWOULDBLOCK. Hostnames and IP addresses involved in the errors are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views4 pages

Smicm Trace

The document contains log entries from an ICM trace file. It records errors from failed SSL handshakes and connection attempts. Specific errors mentioned are SSL_READ, NIEHOST_UNKNOWN, and WSAEWOULDBLOCK. Hostnames and IP addresses involved in the errors are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

-----------------------------------------------------------------------------------

-------------------------------------------------
| ICM Trace File (dev_icm)
-----------------------------------------------------------------------------------
-------------------------------------------------
---------------------------------------------------
trc file: "dev_icm", trc level: 1, release: "753"
---------------------------------------------------
sysno 00
sid PRD
systemid 562 (PC with Windows NT)
relno 7530
patchlevel 0
patchno 1000
intno 20170305
make multithreaded, Unicode, 64 bit, optimized
profile \\mhvmsapprd\sapmnt\PRD\SYS\profile\PRD_DVEBMGS00_mhvmsapprd
pid 7008
[Thr 10484] Mon Apr 8 09:14:45:450 2024
[Thr 10484] Trace file initialized
[Thr 10484] TRACE FILE TRUNCATED
[Thr 31180] Mon Apr 8 09:15:02:500 2024
[Thr 31180] SSL_get_state()==0x21d0 "TLS read finished A"
[Thr 31180] *** ERROR during secussl_read() from SSL_read()==SSL_ERROR_SSL
[Thr 31180] cli SSL session PSE "S:\usr\sap\PRD\DVEBMGS00\sec\SAPSSLDRC.pse"
[Thr 31180] session ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 31180] Client SSL_CTX 000000D9A302DB10 pvflags=896 (TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 31180] TLSextSNI server_name="cert-drcc-prod.a1c4955.kyma.ondemand.com"
[Thr 31180] secussl_read: SSL_read() failed (536875072/0x20001040)
[Thr 31180] => "received a fatal TLS handshake failure alert message from the
peer"
[Thr 31180] >> ---------- Begin of Secu-SSL Errorstack ---------- >>
[Thr 31180] 0x20001040 | SAPCRYPTOLIB | SSL_read
[Thr 31180] SSL API error
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] 0xa0600266 | SSL_ | ssl3_read_bytes
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] 0xa0600266 | SSL_ | ssl3_connect
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] 0xa0600266 | SSL_ | ssl3_read_bytes
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] << ---------- End of Secu-SSL Errorstack ----------
[Thr 31180] Server's List of trusted CAs (from initial CertRequest message):
[Thr 31180] #1 "CN=SwissSign Silver CA - G2, O=SwissSign AG, C=CH"
[Thr 31180] #2 "CN=SSL.com Root Certification Authority RSA, O=SSL
Corporation, L=Houston, SP=Texas, C=US"
[Thr 31180] #3 "CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore,
C=IE"
[Thr 31180] #4 "CN=QuoVadis Root CA 2, O=QuoVadis Limited, C=BM"
[Thr 31180] #5 "CN=QuoVadis Root CA 2 G3, O=QuoVadis Limited, C=BM"
[Thr 31180] #6 "CN=SwissSign Gold CA - G2, O=SwissSign AG, C=CH"
[Thr 31180] #7 "C=DE, O=Atos, CN=Atos TrustedRoot 2011"
[Thr 31180] #8 "CN=DigiCert TLS RSA4096 Root G5, O="DigiCert, Inc.", C=US"
[Thr 31180] #9 "CN=DigiCert Assured ID Root CA, OU=www.digicert.com,
O=DigiCert Inc, C=US"
[Thr 31180] #10 "OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy
Group, Inc.", C=US"
[Thr 31180] #11 "CN=COMODO RSA Certification Authority, O=COMODO CA Limited,
L=Salford, SP=Greater Manchester, C=GB"
[Thr 31180] #12 "CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert
Inc, C=US"
[Thr 31180] #13 "CN=COMODO Certification Authority, O=COMODO CA Limited,
L=Salford, SP=Greater Manchester, C=GB"
[Thr 31180] #14 "CN=SSL.com Root Certification Authority ECC, O=SSL
Corporation, L=Houston, SP=Texas, C=US"
[Thr 31180] #15 "CN=GTS Root R4, O=Google Trust Services LLC, C=US"
[Thr 31180] #16 "CN=Certum CA, O=Unizeto Sp. z o.o., C=PL"
[Thr 31180] #17 "CN=DigiCert RSA4096 Root G5, O="DigiCert, Inc.", C=US"
[Thr 31180] #18 "CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R3"
[Thr 31180] #19 "CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com,
O=DigiCert Inc, C=US"
[Thr 31180] #20 "CN=GTS Root R1, O=Google Trust Services LLC, C=US"
[Thr 31180] #21 "CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6"
[Thr 31180] #22 "CN=Entrust Root Certification Authority, OU="(c) 2006 Entrust,
Inc.", OU=www.entrust.net/CPS is incorporated by
[Thr 31180] #23 "CN=SAP Global Root CA, O=SAP AG, L=Walldorf, C=DE"
[Thr 31180] #24 "CN=GTS Root R2, O=Google Trust Services LLC, C=US"
[Thr 31180] #25 "CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE"
[Thr 31180] #26 "CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com,
Inc.", L=Scottsdale, SP=Arizona, C=US"
[Thr 31180] #27 "CN=GTS Root R3, O=Google Trust Services LLC, C=US"
[Thr 31180] #28 "CN=ISRG Root X1, O=Internet Security Research Group, C=US"
[Thr 31180] #29 "CN=Entrust.net Certification Authority (2048), OU=(c) 1999
Entrust.net Limited, OU=www.entrust.net/CPS_2048 inc
[Thr 31180] #30 "CN=DigiCert ECC P384 Root G5, O="DigiCert, Inc.", C=US"
[Thr 31180] Mon Apr 8 09:15:02:501 2024
[Thr 31180] #31 "OU=Security Communication RootCA2, O="SECOM Trust Systems
CO.,LTD.", C=JP"
[Thr 31180] #32 "CN=QuoVadis Root CA 1 G3, O=QuoVadis Limited, C=BM"
[Thr 31180] #33 "CN=Starfield Services Root Certificate Authority - G2,
O="Starfield Technologies, Inc.", L=Scottsdale, SP=Arizo
[Thr 31180] #34 "CN=SwissSign Platinum CA - G2, O=SwissSign AG, C=CH"
[Thr 31180] #35 "C=ES, O=EDICOM, CN=CAEDICOM Root"
[Thr 31180] #36 "CN=DigiCert Assured ID Root G2, OU=www.digicert.com,
O=DigiCert Inc, C=US"
[Thr 31180] #37 "CN=DigiCert Assured ID Root G3, OU=www.digicert.com,
O=DigiCert Inc, C=US"
[Thr 31180] #38 "CN=Entrust Root Certification Authority - EC1, OU="(c) 2012
Entrust, Inc. - for authorized use only", OU=See ww
[Thr 31180] #39 "CN=Amazon Root CA 1, O=Amazon, C=US"
[Thr 31180] #40 "CN=SAP Cloud Root CA, O=SAP SE, L=Walldorf, C=DE"
[Thr 31180] #41 "CN=T-TeleSec GlobalRoot Class 2, OU=T-Systems Trust Center,
O=T-Systems Enterprise Services GmbH, C=DE"
[Thr 31180] #42 "CN=SAP Internet of Things CA, O=SAP IoT Trust Community II,
C=DE"
[Thr 31180] #43 "OU=certSIGN ROOT CA, O=certSIGN, C=RO"
[Thr 31180] #44 "CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4"
[Thr 31180] #45 "CN=Entrust Root Certification Authority - G2, OU="(c) 2009
Entrust, Inc. - for authorized use only", OU=See www
[Thr 31180] #46 "CN=COMODO ECC Certification Authority, O=COMODO CA Limited,
L=Salford, SP=Greater Manchester, C=GB"
[Thr 31180] #47 "CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert
Inc, C=US"
[Thr 31180] #48 "CN=USERTrust RSA Certification Authority, O=The USERTRUST
Network, L=Jersey City, SP=New Jersey, C=US"
[Thr 31180] #49 "CN=Certigna, O=Dhimyotis, C=FR"
[Thr 31180] #50 "CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert
Inc, C=US"
[Thr 31180] #51 "CN=ISRG Root X2, O=Internet Security Research Group, C=US"
[Thr 31180] #52 "CN=DigiCert TLS ECC P384 Root G5, O="DigiCert, Inc.", C=US"
[Thr 31180] #53 "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert
Inc, C=US"
[Thr 31180] #54 "OU=Starfield Class 2 Certification Authority, O="Starfield
Technologies, Inc.", C=US"
[Thr 31180] #55 "CN=D-TRUST Root Class 3 CA 2 2009, O=D-Trust GmbH, C=DE"
[Thr 31180] Target Hostname="cert-drcc-prod.a1c4955.kyma.ondemand.com"
[Thr 31180] SSL NI-hdl 246: local=10.64.132.89:53514 peer=35.156.5.168:443
[Thr 31180] <<- ERROR: SapSSLSessionStartNB(sssl_hdl=d9a2a93ec0)==SSSLERR_SSL_READ
[Thr 31180] *** ERROR => SSL handshake with cert-drcc-
prod.a1c4955.kyma.ondemand.com:443 failed: SSSLERR_SSL_READ (-58)
[Thr 31180] SAPCRYPTO:SSL_read() failed
[Thr 31180]
[Thr 31180] SapSSLSessionStartNB()==SSSLERR_SSL_READ
[Thr 31180] SSL:SSL_read() failed (536875072/0x20001040)
[Thr 31180] => "received a fatal TLS handshake failure alert message from the
peer"
[Thr 31180] SSL:SSL_get_state()==0x21d0 "TLS read finished A"
[Thr 31180] SSL NI-hdl 246: local=10.64.132.89:53514 peer=35.156.5.168:443
[Thr 31180] cli SSL session PSE "S:\usr\sap\PRD\DVEBMGS00\sec\SAPSSLDRC.pse"
[Thr 31180] session ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH
[Thr 31180] Client SSL_CTX 000000D9A302DB10 pvflags=896 (TLSv1.2,TLSv1.1,TLSv1.0)
[Thr 31180] TLSextSNI server_name="cert-drcc-prod.a1c4955.kyma.ondemand.com"
[Thr 31180] Target Hostname="cert-drcc-prod.a1c4955.kyma.ondemand.com"
[Thr 31180] >> ---- SecuSSL ErrStack: ----
[Thr 31180] 0x20001040 | SAPCRYPTOLIB | SSL_read
[Thr 31180] SSL API error
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] 0xa0600266 | SSL_ | ssl3_read_bytes
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] 0xa0600266 | SSL_ | ssl3_connect
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] 0xa0600266 | SSL_ | ssl3_read_bytes
[Thr 31180] received a fatal TLS handshake failure alert message from the peer
[Thr 31180] << ---------------------------
[Thr 31180]
[Thr 31180] {00148b03} {root-id=005056B790BE1EDEBDAD5BC56CC180BB} [icxxconn.c
2540]
[Thr 31180] RFC_UI T69_U11776_M4, 400, FF_BASIS, MHPC3388,
time=09:15:02, W13, program=RSHTTPPIN, high priority, memory
[Thr 31180] role: Client, protocol: HTTPS, local: 10.64.132.89:53514,
peer: 35.156.5.168:443
[Thr 27064] Mon Apr 8 09:16:49:995 2024
[Thr 27064] *** WARNING => Connect to P25214:1090 failed: NIEHOST_UNKNOWN(-2)
{001a8b09} {root-id=005056B790BE1EDEBDADF229A362E0BB}
[Thr 27064] INTERNAL T93_U15024_M0, 000, SAPSYS, , time=09:16:49,
W13, program=SAPMSSY8, high priority, memory=0, tas
[Thr 27064] role: Client, protocol: HTTP
[Thr 15784] Mon Apr 8 09:16:55:001 2024
[Thr 15784] ***LOG Q0I=> NiBufIConnect: connection pending after 5000ms: connect
(10035: WSAEWOULDBLOCK: Resource temporarily unavai
[Thr 15784] *** ERROR => NiBufIConnect: non-buffered connect pending after 5000ms
(hdl 169;10.64.133.39:1090) [nibuf.cpp 4591]
[Thr 15784] *** WARNING => Connect to a14n6:1090 failed: NIECONN_REFUSED(-10)
{001a8b0a} {root-id=005056B790BE1EDEBDADF229A362E0BB}
[Thr 15784] INTERNAL T93_U15024_M0, 000, SAPSYS, , time=09:16:49,
W13, program=SAPMSSY8, high priority, memory=0, tas
[Thr 15784] role: Client, protocol: HTTP
[Thr 30796] *** WARNING => Connect to http:80 failed: NIEHOST_UNKNOWN(-2)
{001a8b0b} {root-id=005056B790BE1EDEBDADF229A362E0BB} [icx
[Thr 30796] INTERNAL T93_U15024_M0, 000, SAPSYS, , time=09:16:49,
W13, program=SAPMSSY8, high priority, memory=0, tas
[Thr 30796] role: Client, protocol: HTTP
[Thr 9088] Mon Apr 8 09:17:00:014 2024
[Thr 9088] ***LOG Q0I=> NiBufIConnect: connection pending after 5000ms: connect
(10035: WSAEWOULDBLOCK: Resource temporarily unavail
[Thr 9088] *** ERROR => NiBufIConnect: non-buffered connect pending after 5000ms
(hdl 170;10.26.24.44:1090) [nibuf.cpp 4591]
[Thr 9088] *** WARNING => Connect to 10.26.24.44:1090 failed: NIECONN_REFUSED(-10)
{001a8b0c} {root-id=005056B790BE1EDEBDADF229A362E
[Thr 9088] INTERNAL T93_U15024_M0, 000, SAPSYS, , time=09:16:49,
W13, program=SAPMSSY8, high priority, memory=0, task
[Thr 9088] role: Client, protocol: HTTP
[Thr 31180] *** WARNING => Connect to pwdf2625:1090 failed: NIEHOST_UNKNOWN(-2)
{001a8b0d} {root-id=005056B790BE1EDEBDADF229A362E0BB
[Thr 31180] INTERNAL T93_U15024_M0, 000, SAPSYS, , time=09:16:49,
W13, program=SAPMSSY8, high priority, memory=0, tas
[Thr 31180] role: Client, protocol: HTTP
[Thr 17984] Mon Apr 8 09:17:03:766 2024
[Thr 17984] *** WARNING => Connect to http:80 failed: NIEHOST_UNKNOWN(-2)
{001a8b0e} {root-id=005056B790BE1EDEBDADF229A362E0BB} [icx
[Thr 17984] INTERNAL T93_U15024_M0, 000, SAPSYS, , time=09:17:02,
W13, program=SAPMSSY8, high priority, memory=0, tas
[Thr 17984] role: Client, protocol: HTTP
[Thr 22440] Mon Apr 8 09:17:08:771 2024
[Thr 22440] ***LOG Q0I=> NiBufIConnect: connection pending after 5000ms: connect
(10035: WSAEWOULDBLOCK: Resource temporarily unavai
[Thr 22440] *** ERROR => NiBufIConnect: non-buffered connect pending after 5000ms
(hdl 171;10.26.24.44:1090) [nibuf.cpp 4591]
[Thr 22440] *** WARNING => Connect to 10.26.24.44:1090 failed: NIECONN_REFUSED(-10)
{001a8b0f} {root-id=005056B790BE1EDEBDADF229A362
[Thr 22440] INTERNAL T93_U15024_M0, 000, SAPSYS, , time=09:17:02,
W13, program=SAPMSSY8, high priority, memory=0, tas
[Thr 22440] role: Client, protocol: HTTP

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy