Hi,
Situation: i try to run simple test on secure site using Gatling 2.0.0 RC5 (tried also RC3 and RC4). Test consists of one GET, baseUrl is set when initializing http protocol builder:
`
val PROTOCOL = http
.baseURL(BASE_URL)
.inferHtmlResources()
.acceptHeader(""“image/webp,/;q=0.8"”")
.acceptEncodingHeader(""“gzip,deflate”"")
.acceptLanguageHeader(""“lt,en-US;q=0.8,en;q=0.6,pl;q=0.4"”")
.connection(""“keep-alive”"")
.contentTypeHeader(""“application/x-www-form-urlencoded”"")
.userAgentHeader(""“Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.103 Safari/537.36"”")
val scn= scenario(“MyTest”)
.exec(http(“request_1”)
.get("""/""")
.headers(headers_0)
.check(status.is(200)))
setUp(scn.inject(rampUsers(1) over (1))).protocols(PROTOCOL)
`
where BASE_URL is system variable.
When connecting to server through default SSL port 443 (https://host.lt:443) everything goes smoothly. But when trying to connect using custom port (https://host.lt:11888), SSL exception is thrown:
`
12:06:39.900 [GatlingSystem-akka.actor.default-dispatcher-3][WARN ][AsyncHandlerActor.scala:116] i.g.h.a.AsyncHandlerActor - Request ‘request_1’ failed: javax.net.ssl.SSLException: Received fatal alert: handshake_failure
`
At first i thought that it’s certificate problem, but after setting -Djavax.net.debug=ssl got more information. It looks like server doesn’t even respond with ServerHello message:
`
…
*** ClientHello, TLSv1
RandomCookie: GMT: 1411392385 bytes = { 55, 166, 68, 236, 22, 12, 196, 145, 164, 127, 157, 251, 204, 142, 218, 224, 37, 34, 66, 15, 137, 249, 164, 41, 151, 253, 255, 86 }
Session ID: {}
Cipher Suites: [TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_RC4_128_MD5, TLS_EMPTY_RENEGOTIATION_INFO_SCSV]
Compression Methods: { 0 }
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
Extension server_name, server_name: [host_name: host.lt]