-
Bug
-
Resolution: Done
-
Blocker
-
7.1.0.DR12
I can't get work Kerberos for CLI. I am following Zach's notes on topic [1]. Seems to me as same exception as in same scenario in legacy way JBEAP-9084.
18:06:21,927 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Accepted connection from /127.0.0.1:40980 to localhost.localdomain/127.0.0.1:9990 18:06:21,927 TRACE [org.jboss.remoting.remote] (management I/O-1) Setting read listener to org.jboss.remoting3.remote.ServerConnectionOpenListener$Initial@3057703a 18:06:21,928 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Sent 28 bytes 18:06:21,928 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Flushed channel 18:06:21,940 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) No buffers in queue for message header 18:06:21,940 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Allocated fresh buffers 18:06:21,940 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received 59 bytes 18:06:21,940 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received message java.nio.HeapByteBuffer[pos=0 lim=55 cap=8192] 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Received java.nio.HeapByteBuffer[pos=0 lim=55 cap=8192] 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capabilities request 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: version 1 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote endpoint name "cli-client" 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: message close protocol supported 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote version is "5.0.0.Beta17-redhat-1" 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote channels in is "40" 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote channels out is "40" 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: authentication service 18:06:21,940 TRACE [org.jboss.remoting.remote.server] (management I/O-1) No EXTERNAL mechanism due to lack of SSL 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Excluding EXTERNAL due to prior config 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism GSSAPI 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism JBOSS-LOCAL-USER 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism DIGEST-SHA-512 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism DIGEST-SHA-256 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism DIGEST-SHA 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism DIGEST-MD5 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism GS2-KRB5 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism GS2-KRB5-PLUS 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism OAUTHBEARER 18:06:21,943 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism OTP 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-1 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-1-PLUS 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-256 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-256-PLUS 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-384 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-384-PLUS 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-512 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism SCRAM-SHA-512-PLUS 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism PLAIN 18:06:21,944 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Added mechanism ANONYMOUS 18:06:21,944 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Sent 348 bytes 18:06:21,944 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Flushed channel 18:06:22,113 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) No buffers in queue for message header 18:06:22,113 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Allocated fresh buffers 18:06:22,113 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received 585 bytes 18:06:22,113 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received message java.nio.HeapByteBuffer[pos=0 lim=581 cap=8192] 18:06:22,114 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Received java.nio.HeapByteBuffer[pos=0 lim=581 cap=8192] 18:06:22,114 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received authentication request 18:06:22,114 TRACE [org.wildfly.security] (management I/O-1) Handling MechanismInformationCallback 18:06:22,116 TRACE [org.wildfly.security.sasl.gssapi.server] (management I/O-1) configuredMaxReceiveBuffer=16777215 18:06:22,116 TRACE [org.wildfly.security.sasl.gssapi.server] (management I/O-1) relaxComplianceChecks=false 18:06:22,116 TRACE [org.wildfly.security.sasl.gssapi.server] (management I/O-1) QOP={AUTH} 18:06:22,116 TRACE [org.wildfly.security.sasl.gssapi.server] (management I/O-1) Our name 'remote@localhost.localdomain' 18:06:22,120 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Unable to create SaslServer: javax.security.sasl.SaslException: ELY05029: [GSSAPI] Unable to create GSSContext [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos credentails)] at org.wildfly.security.sasl.gssapi.GssapiServer.<init>(GssapiServer.java:77) at org.wildfly.security.sasl.gssapi.GssapiServerFactory.createSaslServer(GssapiServerFactory.java:44) at org.wildfly.security.sasl.util.SecurityProviderSaslServerFactory.createSaslServer(SecurityProviderSaslServerFactory.java:77) at org.wildfly.security.sasl.util.AbstractDelegatingSaslServerFactory.createSaslServer(AbstractDelegatingSaslServerFactory.java:64) at org.wildfly.security.sasl.util.MechanismProviderFilteringSaslServerFactory.createSaslServer(MechanismProviderFilteringSaslServerFactory.java:59) at org.wildfly.security.sasl.util.AbstractDelegatingSaslServerFactory.createSaslServer(AbstractDelegatingSaslServerFactory.java:64) at org.wildfly.security.sasl.util.AbstractDelegatingSaslServerFactory.createSaslServer(AbstractDelegatingSaslServerFactory.java:64) at org.wildfly.security.sasl.util.SetMechanismInformationSaslServerFactory.createSaslServer(SetMechanismInformationSaslServerFactory.java:79) at org.wildfly.security.sasl.util.AuthenticationCompleteCallbackSaslServerFactory.createSaslServer(AuthenticationCompleteCallbackSaslServerFactory.java:51) at org.wildfly.security.sasl.util.TrustManagerSaslServerFactory.createSaslServer(TrustManagerSaslServerFactory.java:72) at org.wildfly.security.sasl.util.AuthenticationTimeoutSaslServerFactory.createSaslServer(AuthenticationTimeoutSaslServerFactory.java:74) at org.wildfly.security.sasl.util.AbstractDelegatingSaslServerFactory.createSaslServer(AbstractDelegatingSaslServerFactory.java:64) at org.wildfly.security.sasl.util.ServerNameSaslServerFactory.createSaslServer(ServerNameSaslServerFactory.java:48) at org.wildfly.security.sasl.util.AbstractDelegatingSaslServerFactory.createSaslServer(AbstractDelegatingSaslServerFactory.java:64) at org.wildfly.security.sasl.util.ProtocolSaslServerFactory.createSaslServer(ProtocolSaslServerFactory.java:48) at org.wildfly.security.sasl.util.SecurityIdentitySaslServerFactory.createSaslServer(SecurityIdentitySaslServerFactory.java:51) at org.wildfly.security.auth.server.SaslAuthenticationFactory.doCreate(SaslAuthenticationFactory.java:59) at org.wildfly.security.auth.server.SaslAuthenticationFactory.doCreate(SaslAuthenticationFactory.java:50) at org.wildfly.security.auth.server.AbstractMechanismAuthenticationFactory.createMechanism(AbstractMechanismAuthenticationFactory.java:54) at org.jboss.remoting3.remote.ServerConnectionOpenListener$Initial.handleEvent(ServerConnectionOpenListener.java:259) at org.jboss.remoting3.remote.ServerConnectionOpenListener$Initial.handleEvent(ServerConnectionOpenListener.java:125) at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92) at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66) at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89) at org.xnio.nio.WorkerThread.run(WorkerThread.java:567) Caused by: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos credentails) at sun.security.jgss.krb5.Krb5AcceptCredential.getInstance(Krb5AcceptCredential.java:87) at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:127) at sun.security.jgss.GSSManagerImpl.getCredentialElement(GSSManagerImpl.java:193) at sun.security.jgss.GSSCredentialImpl.add(GSSCredentialImpl.java:427) at sun.security.jgss.GSSCredentialImpl.<init>(GSSCredentialImpl.java:62) at sun.security.jgss.GSSManagerImpl.createCredential(GSSManagerImpl.java:154) at org.wildfly.security.sasl.gssapi.GssapiServer.<init>(GssapiServer.java:72) ... 24 more 18:17:57,679 TRACE [org.jboss.remoting.remote] (management I/O-1) Rejected invalid SASL mechanism GSSAPI 18:17:57,679 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Sent 5 bytes 18:17:57,679 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Flushed channel 18:17:57,679 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) No buffers in queue for message header 18:17:57,680 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Allocated fresh buffers 18:17:57,680 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received 59 bytes 18:17:57,680 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received message java.nio.HeapByteBuffer[pos=0 lim=55 cap=8192] 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Received java.nio.HeapByteBuffer[pos=0 lim=55 cap=8192] 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capabilities request 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: version 1 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote endpoint name "cli-client" 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: message close protocol supported 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote version is "5.0.0.Beta17-redhat-1" 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote channels in is "40" 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: remote channels out is "40" 18:17:57,680 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received capability: authentication service 18:17:57,680 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Sent 348 bytes 18:17:57,680 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Flushed channel 18:17:57,682 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) No buffers in queue for message header 18:17:57,682 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Allocated fresh buffers 18:17:57,682 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received 23 bytes 18:17:57,682 TRACE [org.jboss.remoting.remote.connection] (management I/O-1) Received message java.nio.HeapByteBuffer[pos=0 lim=19 cap=8192] 18:17:57,682 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Received java.nio.HeapByteBuffer[pos=0 lim=19 cap=8192] 18:17:57,682 TRACE [org.jboss.remoting.remote.server] (management I/O-1) Server received authentication request
CLI output:
18:17:58,086 INFO [com.redhat.eap.qe.cli.CustomCLIExecutor] (main) CLI executor output: 18:17:58,087 INFO [com.redhat.eap.qe.cli.CustomCLIExecutor] (main) Java config name: /home/mchoma/workspace/git-repositories/tests-ldap-kerberos-eap7/eap71/target/krb/krb5-9056759715193121394.conf Loaded from Java config >>>KinitOptions cache name is /home/mchoma/workspace/git-repositories/tests-ldap-kerberos-eap7/eap71/target/krb5cc >>>DEBUG <CCacheInputStream> client principal is jduke84a44d8a-8048-4a77-922d-f36220590e0c@JBOSS.ORG >>>DEBUG <CCacheInputStream> server principal is krbtgt/JBOSS.ORG@JBOSS.ORG >>>DEBUG <CCacheInputStream> key type: 17 >>>DEBUG <CCacheInputStream> auth time: Mon Feb 27 18:17:56 CET 2017 >>>DEBUG <CCacheInputStream> start time: Mon Feb 27 18:17:56 CET 2017 >>>DEBUG <CCacheInputStream> end time: Tue Feb 28 02:17:56 CET 2017 >>>DEBUG <CCacheInputStream> renew_till time: null >>> CCacheInputStream: readFlags() INITIAL; PRE_AUTH; Found ticket for jduke84a44d8a-8048-4a77-922d-f36220590e0c@JBOSS.ORG to go to krbtgt/JBOSS.ORG@JBOSS.ORG expiring on Tue Feb 28 02:17:56 CET 2017 Entered Krb5Context.initSecContext with state=STATE_NEW Service ticket not found in the subject >>> Credentials acquireServiceCreds: same realm default etypes for default_tgs_enctypes: 17. >>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KdcAccessibility: reset >>> KrbKdcReq send: kdc=localhost.localdomain UDP:6088, timeout=5000, number of retries =3, #bytes=644 >>> KDCCommunication: kdc=localhost.localdomain UDP:6088, timeout=5000,Attempt =1, #bytes=644 >>> KrbKdcReq send: #bytes read=630 >>> KdcAccessibility: remove localhost.localdomain:6088 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbApReq: APOptions are 00000000 00000000 00000000 00000000 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType Krb5Context setting mySeqNumber to: 154608971 Krb5Context setting peerSeqNumber to: 0 Created InitSecContextToken: 0000: 01 00 6E 82 02 28 30 82 02 24 A0 03 02 01 05 A1 ..n..(0..$...... 0010: 03 02 01 0E A2 07 03 05 00 00 00 00 00 A3 82 01 ................ 0020: 2A 61 82 01 26 30 82 01 22 A0 03 02 01 05 A1 0B *a..&0.."....... 0030: 1B 09 4A 42 4F 53 53 2E 4F 52 47 A2 2A 30 28 A0 ..JBOSS.ORG.*0(. 0040: 03 02 01 00 A1 21 30 1F 1B 06 72 65 6D 6F 74 65 .....!0...remote 0050: 1B 15 6C 6F 63 61 6C 68 6F 73 74 2E 6C 6F 63 61 ..localhost.loca 0060: 6C 64 6F 6D 61 69 6E A3 81 E1 30 81 DE A0 03 02 ldomain...0..... 0070: 01 11 A2 81 D6 04 81 D3 DD BA 83 2F 75 C2 2F 96 .........../u./. 0080: 7C 51 58 E9 E7 E0 BE 4C 31 8B 63 85 61 90 9B 27 .QX....L1.c.a..' 0090: 61 11 CB C7 89 3C D7 D0 E9 15 D2 AE 87 37 C2 76 a....<.......7.v 00A0: 2E 4B 05 06 5B F6 CD 2E 1C 38 9F CE 27 A3 01 31 .K..[....8..'..1 00B0: 5B 25 8F 49 B2 47 71 8E B5 5D 33 15 5A E6 E6 64 [%.I.Gq..]3.Z..d 00C0: 40 2E E9 AB EC B8 5C D2 61 5B B4 95 59 F4 40 19 @.....\.a[..Y.@. 00D0: 1B 67 54 22 93 B9 1B 4C F8 EE AA 66 94 1C 29 A5 .gT"...L...f..). 00E0: 6C 4D 1F DD F6 F9 01 86 29 E9 D3 C1 FC 90 58 0F lM......).....X. 00F0: C6 2E 4F 02 DE E8 F7 AD DB 75 4F 1E AB 62 E2 E2 ..O......uO..b.. 0100: 18 1D CD 2C B3 A4 49 BA 3F 46 73 55 3D A7 86 58 ...,..I.?FsU=..X 0110: 8D 52 7E 31 62 5A DB FA D3 A3 6C A9 53 94 F8 EA .R.1bZ....l.S... 0120: AA FD 13 E2 D7 08 63 7B AD DD 84 DF D1 66 3D 27 ......c......f=' 0130: 4B BA BC E0 EF 8F D4 56 8A D0 BC 7A 24 03 CA 84 K......V...z$... 0140: 75 F3 45 4A 3D 45 8B D8 B8 EF EC A4 81 E0 30 81 u.EJ=E........0. 0150: DD A0 03 02 01 11 A2 81 D5 04 81 D2 A0 75 51 33 .............uQ3 0160: 82 AD 84 21 64 36 51 30 61 F7 4A 36 6C 49 8B E0 ...!d6Q0a.J6lI.. 0170: 5E AF 9D EE 97 71 93 A5 B8 DD 25 90 70 DA 96 7A ^....q....%.p..z 0180: E2 92 FC 47 8E 1C AC 5F 89 F5 18 CA B3 FE 62 73 ...G..._......bs 0190: 07 46 13 08 F0 4B 42 19 73 07 4C 6D D9 4F FD 3F .F...KB.s.Lm.O.? 01A0: AC D9 9D 93 96 7A A5 57 11 B1 10 B1 66 73 8E C9 .....z.W....fs.. 01B0: F3 71 44 E2 AF 3A A4 20 DD 38 5A 0D AC 68 30 A4 .qD..:. .8Z..h0. 01C0: FF 5F 07 A1 DF A0 C3 AD D2 AF 3E EC 34 DB 45 0F ._........>.4.E. 01D0: C6 7B B7 09 16 40 57 64 61 54 B0 58 DC 07 3A 87 .....@WdaT.X..:. 01E0: A2 96 3B AE 97 E4 C0 05 9A 8A 57 B0 98 A4 23 37 ..;.......W...#7 01F0: 41 B6 07 22 F8 FF CF E7 7C 3F 13 CF 8C 90 46 03 A..".....?....F. 0200: DF FF 9D 41 F1 42 5C EB CA 61 77 93 01 7E B9 B0 ...A.B\..aw..... 0210: 5C 7F 78 91 88 5C 27 8A 6F A8 2A 16 CC C4 E8 03 \.x..\'.o.*..... 0220: A5 FB 44 14 3F D6 C1 30 CB 08 75 BF 80 89 ..D.?..0..u... >>>KinitOptions cache name is /home/mchoma/workspace/git-repositories/tests-ldap-kerberos-eap7/eap71/target/krb5cc >>>DEBUG <CCacheInputStream> client principal is jduke84a44d8a-8048-4a77-922d-f36220590e0c@JBOSS.ORG >>>DEBUG <CCacheInputStream> server principal is krbtgt/JBOSS.ORG@JBOSS.ORG >>>DEBUG <CCacheInputStream> key type: 17 >>>DEBUG <CCacheInputStream> auth time: Mon Feb 27 18:17:56 CET 2017 >>>DEBUG <CCacheInputStream> start time: Mon Feb 27 18:17:56 CET 2017 >>>DEBUG <CCacheInputStream> end time: Tue Feb 28 02:17:56 CET 2017 >>>DEBUG <CCacheInputStream> renew_till time: null >>> CCacheInputStream: readFlags() INITIAL; PRE_AUTH; Found ticket for jduke84a44d8a-8048-4a77-922d-f36220590e0c@JBOSS.ORG to go to krbtgt/JBOSS.ORG@JBOSS.ORG expiring on Tue Feb 28 02:17:56 CET 2017 Entered Krb5Context.initSecContext with state=STATE_NEW Service ticket not found in the subject >>> Credentials acquireServiceCreds: same realm default etypes for default_tgs_enctypes: 17. >>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbKdcReq send: kdc=localhost.localdomain UDP:6088, timeout=5000, number of retries =3, #bytes=644 >>> KDCCommunication: kdc=localhost.localdomain UDP:6088, timeout=5000,Attempt =1, #bytes=644 >>> KrbKdcReq send: #bytes read=630 >>> KdcAccessibility: remove localhost.localdomain:6088 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType >>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000 >>> EType: sun.security.krb5.internal.crypto.Aes128CtsHmacSha1EType Krb5Context setting mySeqNumber to: 1040435217 Created InitSecContextToken: 0000: 01 00 6E 82 02 28 30 82 02 24 A0 03 02 01 05 A1 ..n..(0..$...... 0010: 03 02 01 0E A2 07 03 05 00 20 00 00 00 A3 82 01 ......... ...... 0020: 2A 61 82 01 26 30 82 01 22 A0 03 02 01 05 A1 0B *a..&0.."....... 0030: 1B 09 4A 42 4F 53 53 2E 4F 52 47 A2 2A 30 28 A0 ..JBOSS.ORG.*0(. 0040: 03 02 01 00 A1 21 30 1F 1B 06 72 65 6D 6F 74 65 .....!0...remote 0050: 1B 15 6C 6F 63 61 6C 68 6F 73 74 2E 6C 6F 63 61 ..localhost.loca 0060: 6C 64 6F 6D 61 69 6E A3 81 E1 30 81 DE A0 03 02 ldomain...0..... 0070: 01 11 A2 81 D6 04 81 D3 D2 2A 98 A0 20 10 44 2E .........*.. .D. 0080: 32 29 31 67 62 56 52 D0 71 BE 20 79 4A 3E 02 EF 2)1gbVR.q. yJ>.. 0090: 60 25 96 65 AB BD 94 10 A9 A4 A9 AC 26 39 BC CA `%.e........&9.. 00A0: 8E 64 D6 BF 60 D4 5F 48 C2 11 CF D5 DD 11 1A F8 .d..`._H........ 00B0: 24 30 EE 6B 46 12 AF AE 2F 04 81 6F 65 82 29 4D $0.kF.../..oe.)M 00C0: 83 07 2E 32 22 88 3B 31 58 82 66 66 5C 10 42 00 ...2".;1X.ff\.B. 00D0: DA 0D 8F E5 E3 37 23 9D B3 DE B7 8D 9B 07 19 7C .....7#......... 00E0: 6D D9 4D 19 6E C6 00 7C FF 31 E6 08 2B 5A DF 72 m.M.n....1..+Z.r 00F0: 7A 2D 98 3E C1 66 DE 21 81 3B CE AE F0 21 9B ED z-.>.f.!.;...!.. 0100: EF 9D 5F 45 B9 8F AB 4E 8B B5 21 D7 6C 32 0C B5 .._E...N..!.l2.. 0110: 0F 73 AE 14 35 E0 56 AF DB B6 3B 0A BD E9 EB 24 .s..5.V...;....$ 0120: 74 DB 65 36 DB 0A 12 BA CF 89 20 A1 E3 4D D1 D7 t.e6...... ..M.. 0130: 09 98 9E 1D 16 42 4A AF 2E 13 86 4E B8 35 A2 E4 .....BJ....N.5.. 0140: E7 42 92 13 13 EB BD BB 59 1A CA A4 81 E0 30 81 .B......Y.....0. 0150: DD A0 03 02 01 11 A2 81 D5 04 81 D2 AE 25 CF 3E .............%.> 0160: 97 E2 9C FF 32 AB 1C F9 65 C0 AC CC 67 E8 BD D8 ....2...e...g... 0170: C1 6B AA 30 E4 C7 5B B9 E6 1E 14 7D 38 99 AF BA .k.0..[.....8... 0180: 47 E5 BA A0 45 71 B8 7E 8D 79 29 31 56 AA 3F AE G...Eq...y)1V.?. 0190: FF A7 41 01 F9 07 88 47 CF 4F 4A 8D F4 56 BD 68 ..A....G.OJ..V.h 01A0: BB 1F 80 EB BA BF DB AC AC 8C 75 8D 52 FC D0 C9 ..........u.R... 01B0: 71 B8 7A 44 92 AF C7 A5 A6 69 3C 06 81 3B 40 71 q.zD.....i<..;@q 01C0: 84 36 5C F9 A0 BB 63 D6 15 9F 0B 20 BF 1F C0 88 .6\...c.... .... 01D0: 1E BD 3A 83 98 FC A3 0C 7E AD EF E9 37 29 3A 8C ..:.........7):. 01E0: 9D B7 16 39 4E 54 22 B9 59 71 10 B3 78 30 0B 91 ...9NT".Yq..x0.. 01F0: 84 06 70 CA F1 6A 1E 34 15 F6 94 01 FC 79 A0 BA ..p..j.4.....y.. 0200: 1A B9 14 64 DC E4 76 98 E3 E1 5D 88 03 3B 69 C8 ...d..v...]..;i. 0210: 10 44 2D 21 D8 D9 C5 40 FE 4E 71 43 72 C1 47 04 .D-!...@.NqCr.G. 0220: B4 F7 E5 4F 8B 1E 5B DF 8D 10 FA 45 3C E1 ...O..[....E<. Failed to connect to the controller: The controller is not available at localhost.localdomain:9990: java.net.ConnectException: WFLYPRT0053: Could not connect to remote+http://localhost.localdomain:9990. The connection failed: WFLYPRT0053: Could not connect to remote+http://localhost.localdomain:9990. The connection failed: JBREM000202: Abrupt close on Remoting connection 7db99281 to localhost.localdomain/127.0.0.1:9990 of endpoint "cli-client" <24d0904f>