@@ -775,6 +775,7 @@ private Message handleClientConfigRequest(final Message request) {
775775
776776 private Message handleDiffieHellmanKeyExchange (final Message request ) {
777777 if (encryptor .get ().isActive ()) {
778+ logger .warn ("conn-" + connectionId , "Diffie-Hellman keys already exchanged!" );
778779 return createPlainTextResponseMessage (
779780 ResponseStatus .DIFFIE_HELLMAN_NAK ,
780781 null ,
@@ -783,9 +784,14 @@ private Message handleDiffieHellmanKeyExchange(final Message request) {
783784 }
784785 else {
785786 try {
787+ logger .info ("conn-" + connectionId , "Diffie-Hellman keys exchanged started" );
788+
786789 final String clientPublicKey = request .getText ();
787790 encryptor .set (Encryptor .aes (dhKeys .generateSharedSecret (clientPublicKey )));
788791
792+ logger .info ("conn-" + connectionId , "Diffie-Hellman keys exchanged" );
793+ logger .info ("conn-" + connectionId , "Activated message encryption!" );
794+
789795 // send the server's public key back
790796 return createPlainTextResponseMessage (
791797 ResponseStatus .DIFFIE_HELLMAN_ACK ,
@@ -794,6 +800,8 @@ private Message handleDiffieHellmanKeyExchange(final Message request) {
794800 dhKeys .getPublicKeyBase64 ());
795801 }
796802 catch (Exception ex ) {
803+ logger .warn ("conn-" + connectionId , "Diffie-Hellman key exchange error!" , ex );
804+
797805 return createPlainTextResponseMessage (
798806 ResponseStatus .DIFFIE_HELLMAN_NAK ,
799807 null ,
0 commit comments