lync "entered and stored passwords do not match" problems

Help
2013-05-22
2013-07-26
  • robert lazarski

    robert lazarski - 2013-05-22

    Hi all, I checked out the latest sipe source from git and compiled on opensuse 12.2, with Pidgin 2.10.7. I get this error though I am believe the passwords are entered correctly, or are at least in the form I login to Office 365. Please help.

    Web ticket request to https://webpoolbl20a04.infra.lync.com:443/CertProv/CertProvisioningService.svc failed
    (The entered and stored passwords do not match.)

    Couldn't figure out log blocks in html in this site, sorry about that!

    <a href="#">
    (11:35:17) account: Connecting to account rlazarski@mycompany.com,rlazarski@mycompany.com.
    (11:35:17) connection: Connecting. gc = 0x1c22290
    (11:35:17) sipe: sipe_purple_login: username 'rlazarski@mycompany.com,rlazarski@mycompany.com'
    (11:35:17) sipe: sipe_core_allocate: SIPE version 1.15.1 (git commit 7209396) signin_name 'rlazarski@mycompany.com'
    (11:35:17) sipe: sipe_core_allocate: user 'rlazarski' domain 'mycompany.com'
    (11:35:17) sipe: sipe_cert_crypto_init: generate key pair, this might take a while...
    (11:35:17) sipe: sipe_cert_crypto_init: key pair generated
    (11:35:17) sipe: sipe_certificate_init: DONE
    (11:35:17) sipe: sipe_core_connect: user specified SIP server sipdir.online.lync.com:443
    (11:35:17) sipe: transport_connect - hostname: sipdir.online.lync.com port: 443
    (11:35:17) sipe: using SSL
    (11:35:17) dnsquery: Performing DNS lookup for sipdir.online.lync.com
    (11:35:17) dns: Wait for DNS child 29246 failed: No child processes
    (11:35:17) dns: Created new DNS child 29351, there are now 1 children.
    (11:35:17) dns: Successfully sent DNS request to child 29351
    (11:35:17) dns: Got response for 'sipdir.online.lync.com'
    (11:35:17) dnsquery: IP resolved for sipdir.online.lync.com
    (11:35:17) proxy: Attempting connection to 132.245.1.21
    (11:35:17) proxy: Connecting to sipdir.online.lync.com:443 with no proxy
    (11:35:17) proxy: Connection in progress
    (11:35:18) proxy: Connecting to sipdir.online.lync.com:443.
    (11:35:18) proxy: Connected to sipdir.online.lync.com:443.
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Allocating epoch #0
    (11:35:18) gnutls: Starting handshake with sipdir.online.lync.com
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_constate.c:717
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Allocating epoch #1
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 (00.66)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 (00.05)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Keeping ciphersuite: RSA_ARCFOUR_MD5 (00.04)
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: Sending extension SAFE RENEGOTIATION (1 bytes)
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: Sending extension SUPPORTED ECC (12 bytes)
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (4.1) RSA-SHA256
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (4.2) DSA-SHA256
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (4.3) ECDSA-SHA256
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (5.1) RSA-SHA384
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (5.3) ECDSA-SHA384
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (6.1) RSA-SHA512
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (6.3) ECDSA-SHA512
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (3.1) RSA-SHA224
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (3.2) DSA-SHA224
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (3.3) ECDSA-SHA224
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (2.1) RSA-SHA1
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (2.2) DSA-SHA1
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: sent signature algo (2.3) ECDSA-SHA1
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: CLIENT HELLO was queued [184 bytes]
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Preparing Packet Handshake(22) with length: 184
    (11:35:18) gnutls: lvl 9: ENC[0x1d70500]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Sent Packet[1] Handshake(22) in epoch 0 and length: 189
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: SSL 3.1 Handshake packet received. Epoch 0, length: 4759
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Expected Packet Handshake(22)
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Received Packet Handshake(22) with length: 4759
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: SSL 3.1 Handshake packet received. Epoch 0, length: 4759
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Expected Packet Handshake(22)
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Received Packet Handshake(22) with length: 4759
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Decrypted Packet[0] Handshake(22) with length: 4759
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: SERVER HELLO was received. Length 77[4755], frag offset 0, frag length: 77, sequence: 0
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Server's version: 3.1
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: SessionID length: 32
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: SessionID: b802000090ea6cf6386042f25bbf0057fab7ca4b7a7c3bd32dc1f52a4be46135
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Selected cipher suite: RSA_AES_128_CBC_SHA1
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Selected compression method: NULL (0)
    (11:35:18) gnutls: lvl 3: EXT[0x1d70500]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Safe renegotiation succeeded
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: CERTIFICATE was received. Length 4670[4674], frag offset 0, frag length: 4670, sequence: 0
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1168
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:966
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1168
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1150
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: CLIENT KEY EXCHANGE was queued [262 bytes]
    (11:35:18) gnutls: lvl 3: REC[0x1d70500]: Sent ChangeCipherSpec
    (11:35:18) gnutls: lvl 9: INT: PREMASTER SECRET[48]: 030302e389a7b08256fa4f0d1e572801bbf5769e12c978678558230b33940249957948aeb66eba53919b25ae5408b20d
    (11:35:18) gnutls: lvl 9: INT: CLIENT RANDOM[32]: 519cd7a6c2ccaa901ce569d8ded9c795231517ef5b8e05a1b0a1ce61a346c701
    (11:35:18) gnutls: lvl 9: INT: SERVER RANDOM[32]: 519d2c09372bc195ef39a8102036f5229a068301fc33f48dca4a92fdc9c3dea7
    (11:35:18) gnutls: lvl 9: INT: MASTER SECRET: 71fefaf0a224f6f28fa905d5a83c2e63bf2a9f6327c747dc9d2c1c7a325d6072537b9e32ad1746ed689ce41c42b7f975
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Initializing epoch #1
    (11:35:18) gnutls: lvl 9: INT: KEY BLOCK[104]: f62db3b1ecc256a019029e0e52f721bcbb17b6da9c96a5cbe63a3342bdb89f21
    (11:35:18) gnutls: lvl 9: INT: CLIENT WRITE KEY [16]: 5e17c5421100c63981153c31e154cac7
    (11:35:18) gnutls: lvl 9: INT: SERVER WRITE KEY [16]: 658cfa4e3fb1a755d31cd29ec78ac723
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Epoch #1 ready
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Cipher Suite: RSA_AES_128_CBC_SHA1
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: Initializing internal [write] cipher sessions
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: recording tls-unique CB (send)
    (11:35:18) gnutls: lvl 3: HSK[0x1d70500]: FINISHED was queued [16 bytes]
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Preparing Packet Handshake(22) with length: 262
    (11:35:18) gnutls: lvl 9: ENC[0x1d70500]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Sent Packet[2] Handshake(22) in epoch 0 and length: 267
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Preparing Packet ChangeCipherSpec(20) with length: 1
    (11:35:18) gnutls: lvl 9: ENC[0x1d70500]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Preparing Packet Handshake(22) with length: 16
    (11:35:18) gnutls: lvl 9: ENC[0x1d70500]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:18) gnutls: lvl 4: REC[0x1d70500]: Sent Packet[1] Handshake(22) in epoch 1 and length: 85
    (11:35:18) gnutls: lvl 2: ASSERT: session_ticket.c:684
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:18) gnutls: lvl 2: ASSERT: gnutls_handshake.c:2696
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Expected Packet ChangeCipherSpec(20)
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Received Packet ChangeCipherSpec(20) with length: 1
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Decrypted Packet[1] ChangeCipherSpec(20) with length: 1
    (11:35:19) gnutls: lvl 3: HSK[0x1d70500]: Cipher Suite: RSA_AES_128_CBC_SHA1
    (11:35:19) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: SSL 3.1 Handshake packet received. Epoch 0, length: 48
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Expected Packet Handshake(22)
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Received Packet Handshake(22) with length: 48
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Decrypted Packet[0] Handshake(22) with length: 16
    (11:35:19) gnutls: lvl 3: HSK[0x1d70500]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Start of epoch cleanup
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Epoch #0 freed
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: End of epoch cleanup
    (11:35:19) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:19) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:19) gnutls: Handshake complete
    (11:35:19) gnutls/x509: Key print: 08:b3:70:2a:88:53:69:e5:8f:dc:ef:7c:87:a8:4a:a7:93:fb:0c:7d
    (11:35:19) gnutls/x509: Key print: 3a:dd:0e:7e:a2:b2:84:ff:45:9e:13:73:65:b4:82:d1:88:df:bf:8a
    (11:35:19) gnutls/x509: Key print: e5:95:8d:48:fe:10:d7:34:03:11:e8:c0:3b:b2:29:40:da:ba:2d:a3
    (11:35:19) gnutls: Peer provided 3 certs
    (11:35:19) gnutls: Lvl 0 SHA1 fingerprint: 08:b3:70:2a:88:53:69:e5:8f:dc:ef:7c:87:a8:4a:a7:93:fb:0c:7d
    (11:35:19) gnutls: Serial: 7d:0b:27:33:00:08:00:02:b3:68
    (11:35:19) gnutls: Cert DN: C=US,ST=Washington,L=Redmond,O=Microsoft,OU=UCG,CN=sipfed.online.lync.com
    (11:35:19) gnutls: Cert Issuer DN: DC=com,DC=microsoft,DC=corp,DC=redmond,CN=Microsoft Secure Server Authority
    (11:35:19) gnutls: Lvl 1 SHA1 fingerprint: 3a:dd:0e:7e:a2:b2:84:ff:45:9e:13:73:65:b4:82:d1:88:df:bf:8a
    (11:35:19) gnutls: Serial: 61:03:33:36:00:05:00:00:00:30
    (11:35:19) gnutls: Cert DN: DC=com,DC=microsoft,DC=corp,DC=redmond,CN=Microsoft Secure Server Authority
    (11:35:19) gnutls: Cert Issuer DN: CN=Microsoft Internet Authority
    (11:35:19) gnutls: Lvl 2 SHA1 fingerprint: e5:95:8d:48:fe:10:d7:34:03:11:e8:c0:3b:b2:29:40:da:ba:2d:a3
    (11:35:19) gnutls: Serial: 07:27:62:02
    (11:35:19) gnutls: Cert DN: CN=Microsoft Internet Authority
    (11:35:19) gnutls: Cert Issuer DN: C=US,O=GTE Corporation,OU=GTE CyberTrust Solutions\, Inc.,CN=GTE CyberTrust Global Root
    (11:35:19) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:19) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:19) certificate/x509/tls_cached: Starting verify for sipdir.online.lync.com
    (11:35:19) certificate/x509/tls_cached: Checking for cached cert...
    (11:35:19) certificate/x509/tls_cached: ...Found cached cert
    (11:35:19) gnutls: Attempting to load X.509 certificate from /home/iksrazal/.purple/certificates/x509/tls_peers/sipdir.online.lync.com
    (11:35:19) certificate/x509/tls_cached: Peer cert matched cached
    (11:35:19) gnutls: lvl 2: ASSERT: common.c:836
    (11:35:19) util: Writing file /home/iksrazal/.purple/certificates/x509/tls_peers/sipdir.online.lync.com
    (11:35:19) certificate: Successfully verified certificate for sipdir.online.lync.com
    (11:35:19) stun: using server 
    (11:35:19) stun: using server 
    (11:35:19) stun: using server 
    (11:35:19) sipe: sipe_schedule_allocate timeouts count 1 after addition
    (11:35:19) sipe: scheduling action <transaction timeout><3BCAg6E5FaD295iAA81mDD3Et31CFb7E1Cx48B6x><1 REGISTER> timeout 60 seconds
    (11:35:19) sipe: SIP transactions count:1 after addition
    (11:35:19) sipe: 
    MESSAGE START >>>>>>>>>> SIP - 2013-05-22T14:35:19.358958Z
    REGISTER sip:mycompany.com SIP/2.0
    Via: SIP/2.0/tls 192.168.0.105:46346;branch=z9hG4bK60213445D404EC909DF3
    From: <sip:rlazarski@mycompany.com>;tag=1400035127;epid=7b9986c8b5ed
    To: <sip:rlazarski@mycompany.com>
    Max-Forwards: 70
    CSeq: 1 REGISTER
    User-Agent: UCCAPI/4.0.7577.314 OC/4.0.7577.314 (Microsoft Lync 2010)
    Call-ID: 3BCAg6E5FaD295iAA81mDD3Et31CFb7E1Cx48B6x
    Contact: <sip:192.168.0.105:46346;transport=tls;ms-opaque=d3470f2e1d>;methods="INVITE, MESSAGE, INFO, SUBSCRIBE, OPTIONS, BYE, CANCEL, NOTIFY, ACK, REFER, BENOTIFY";proxy=replace;+sip.instance="<urn:uuid:5bd22201-749f-5331-b224-b3e088a11d65>"
    Supported: gruu-10, adhoclist, msrtc-event-categories, com.microsoft.msrtc.presence
    Event: registration
    Allow-Events: presence
    ms-keep-alive: UAC;hop-hop=yes
    Content-Length: 0
    
    MESSAGE END >>>>>>>>>> SIP - 2013-05-22T14:35:19.358958Z
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Preparing Packet Application Data(23) with length: 805
    (11:35:19) gnutls: lvl 9: ENC[0x1d70500]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Sent Packet[2] Application Data(23) in epoch 1 and length: 933
    (11:35:19) sipe: transport_input_common: new buffer length 4096
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: SSL 3.1 Application Data packet received. Epoch 0, length: 720
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Expected Packet Application Data(23)
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Received Packet Application Data(23) with length: 720
    (11:35:19) gnutls: lvl 4: REC[0x1d70500]: Decrypted Packet[1] Application Data(23) with length: 695
    (11:35:19) sipe: 
    MESSAGE START <<<<<<<<<< SIP - 2013-05-22T14:35:19.531201Z
    SIP/2.0 401 Unauthorized
    ms-user-logon-data: RemoteUser
    Date: Wed, 22 May 2013 20:35:23 GMT
    WWW-Authenticate: TLS-DSK realm="SIP Communications Service", targetname="BL20A04FES04.infra.lync.com", version=4, sts-uri="https://webpoolbl20a04.infra.lync.com:443/CertProv/CertProvisioningService.svc"
    From: <sip:rlazarski@mycompany.com>;tag=1400035127;epid=7b9986c8b5ed
    To: <sip:rlazarski@mycompany.com>;tag=F89B00188270F3E7D98B835E20F5FAD4
    Call-ID: 3BCAg6E5FaD295iAA81mDD3Et31CFb7E1Cx48B6x
    CSeq: 1 REGISTER
    Via: SIP/2.0/tls 192.168.0.105:46346;branch=z9hG4bK60213445D404EC909DF3;received=132.245.0.9;ms-received-port=46346;ms-received-cid=7C980B00
    Server: RTC/5.0
    Content-Length: 0
    
    MESSAGE END <<<<<<<<<< SIP - 2013-05-22T14:35:19.531201Z
    (11:35:19) sipe: process_input_message: msg->response(401),msg->method(REGISTER)
    (11:35:19) sipe: process_input_message: RE-REGISTER CSeq: 1
    (11:35:19) sipe: process_input_message: we have a transaction callback
    (11:35:19) sipe: process_register_response: got response to REGISTER; expires = 0
    (11:35:19) sipe: process_register_response: REGISTER retries 1
    (11:35:19) sipe: process_register_response: Auth header: TLS-DSK realm="SIP Communications Service", targetname="BL20A04FES04.infra.lync.com", version=4, sts-uri="https://webpoolbl20a04.infra.lync.com:443/CertProv/CertProvisioningService.svc"
    (11:35:19) stun: using server 
    (11:35:19) stun: using server 
    (11:35:19) sipe: sipe_certificate_tls_dsk_find: certificate for 'BL20A04FES04.infra.lync.com' is invalid
    (11:35:19) sipe: initialize_auth_context: TLS-DSK Certificate Provisioning URI https://webpoolbl20a04.infra.lync.com:443/CertProv/CertProvisioningService.svc
    (11:35:19) sipe: sipe_http_parse_uri: host 'webpoolbl20a04.infra.lync.com' port 443 path 'CertProv/CertProvisioningService.svc/mex'
    (11:35:19) sipe: sipe_http_transport_new: new webpoolbl20a04.infra.lync.com:443
    (11:35:19) sipe: transport_connect - hostname: webpoolbl20a04.infra.lync.com port: 443
    (11:35:19) sipe: using SSL
    (11:35:19) dnsquery: Performing DNS lookup for webpoolbl20a04.infra.lync.com
    (11:35:19) sipe: process_input_message: removing CSeq 2
    (11:35:19) sipe: SIP transactions count:0 after removal
    (11:35:19) sipe: sipe_schedule_remove: action name=<transaction timeout><3BCAg6E5FaD295iAA81mDD3Et31CFb7E1Cx48B6x><1 REGISTER>
    (11:35:19) dns: Successfully sent DNS request to child 29351
    (11:35:19) dns: Got response for 'webpoolbl20a04.infra.lync.com'
    (11:35:19) dnsquery: IP resolved for webpoolbl20a04.infra.lync.com
    (11:35:19) proxy: Attempting connection to 65.55.127.47
    (11:35:19) proxy: Connecting to webpoolbl20a04.infra.lync.com:443 with no proxy
    (11:35:19) proxy: Connection in progress
    (11:35:20) proxy: Connecting to webpoolbl20a04.infra.lync.com:443.
    (11:35:20) proxy: Connected to webpoolbl20a04.infra.lync.com:443.
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Allocating epoch #0
    (11:35:20) gnutls: Starting handshake with webpoolbl20a04.infra.lync.com
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_constate.c:717
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Allocating epoch #1
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 (00.66)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 (00.05)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Keeping ciphersuite: RSA_ARCFOUR_MD5 (00.04)
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: Sending extension SAFE RENEGOTIATION (1 bytes)
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: Sending extension SUPPORTED ECC (12 bytes)
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (4.1) RSA-SHA256
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (4.2) DSA-SHA256
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (4.3) ECDSA-SHA256
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (5.1) RSA-SHA384
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (5.3) ECDSA-SHA384
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (6.1) RSA-SHA512
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (6.3) ECDSA-SHA512
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (3.1) RSA-SHA224
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (3.2) DSA-SHA224
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (3.3) ECDSA-SHA224
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (2.1) RSA-SHA1
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (2.2) DSA-SHA1
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: sent signature algo (2.3) ECDSA-SHA1
    (11:35:20) gnutls: lvl 3: EXT[0x1cdf9d0]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: CLIENT HELLO was queued [184 bytes]
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet Handshake(22) with length: 184
    (11:35:20) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 189
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Handshake packet received. Epoch 0, length: 74
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Handshake(22)
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Handshake(22) with length: 74
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Decrypted Packet[0] Handshake(22) with length: 74
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: SERVER HELLO was received. Length 70[70], frag offset 0, frag length: 70, sequence: 0
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Server's version: 3.1
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: SessionID length: 32
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: SessionID: 6fbca2eedcad0a56a9e6f18a2ec20ca1bed09bceb9d46b7eeb45ee9b648acf6d
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Selected cipher suite: RSA_ARCFOUR_MD5
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Selected compression method: NULL (0)
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_extensions.c:161
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Allowing unsafe initial negotiation
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Handshake packet received. Epoch 0, length: 5156
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Handshake(22)
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Handshake(22) with length: 5156
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_kx.c:670
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Handshake packet received. Epoch 0, length: 5156
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Handshake(22)
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Handshake(22) with length: 5156
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Decrypted Packet[1] Handshake(22) with length: 5156
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: CERTIFICATE was received. Length 5152[5152], frag offset 0, frag length: 5152, sequence: 0
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Handshake packet received. Epoch 0, length: 4
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Handshake(22)
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Handshake(22) with length: 4
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Decrypted Packet[2] Handshake(22) with length: 4
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:966
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1150
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: CLIENT KEY EXCHANGE was queued [262 bytes]
    (11:35:20) gnutls: lvl 3: REC[0x1cdf9d0]: Sent ChangeCipherSpec
    (11:35:20) gnutls: lvl 9: INT: PREMASTER SECRET[48]: 03035a0799bbf3807a53952cb45ba58ed387d575efc5ec7e0dc65d28b186752a8c2399806afa5521e9cc323b7e2978ff
    (11:35:20) gnutls: lvl 9: INT: CLIENT RANDOM[32]: 519cd7a8bd972cfc407284a23fbd9ff81191d88da59434a5c65ee31c0b53b3e5
    (11:35:20) gnutls: lvl 9: INT: SERVER RANDOM[32]: 707983d3f9f569822fceeae42149fd62b26fcc364f2176a75d7f05e371be4482
    (11:35:20) gnutls: lvl 9: INT: MASTER SECRET: 6be9d3fc4f6c80447554ff4968c6a750b99e722171ca5faee1723483327c14c229695e50833add97ef3f5f7f774138ae
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Initializing epoch #1
    (11:35:20) gnutls: lvl 9: INT: KEY BLOCK[64]: cea21766a666acf28e7c480066ceb1de95d5c14037e1342b4deb82ffbe3197e8
    (11:35:20) gnutls: lvl 9: INT: CLIENT WRITE KEY [16]: e6eeaba1c16fd11e32cfd52b35d21a17
    (11:35:20) gnutls: lvl 9: INT: SERVER WRITE KEY [16]: cd954876b4493e666627f0dd2b92e47f
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Epoch #1 ready
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Cipher Suite: RSA_ARCFOUR_MD5
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: Initializing internal [write] cipher sessions
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: recording tls-unique CB (send)
    (11:35:20) gnutls: lvl 3: HSK[0x1cdf9d0]: FINISHED was queued [16 bytes]
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet Handshake(22) with length: 262
    (11:35:20) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 267
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet ChangeCipherSpec(20) with length: 1
    (11:35:20) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet Handshake(22) with length: 16
    (11:35:20) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: ARCFOUR-128, MAC: MD5, Epoch: 1
    (11:35:20) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 37
    (11:35:20) gnutls: lvl 2: ASSERT: session_ticket.c:684
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:20) gnutls: lvl 2: ASSERT: gnutls_handshake.c:2696
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet ChangeCipherSpec(20)
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet ChangeCipherSpec(20) with length: 1
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
    (11:35:21) gnutls: lvl 3: HSK[0x1cdf9d0]: Cipher Suite: RSA_ARCFOUR_MD5
    (11:35:21) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Handshake packet received. Epoch 0, length: 32
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Handshake(22)
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Handshake(22) with length: 32
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Decrypted Packet[0] Handshake(22) with length: 16
    (11:35:21) gnutls: lvl 3: HSK[0x1cdf9d0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Start of epoch cleanup
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Epoch #0 freed
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: End of epoch cleanup
    (11:35:21) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:21) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:21) gnutls: lvl 2: ASSERT: x509.c:977
    (11:35:21) gnutls: lvl 2: ASSERT: x509.c:977
    (11:35:21) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:21) gnutls: Handshake complete
    (11:35:21) gnutls/x509: Key print: 4b:85:64:8b:05:12:6e:1b:b9:b1:1a:52:c5:ec:c4:f2:d5:82:e3:60
    (11:35:21) gnutls/x509: Key print: 3a:dd:0e:7e:a2:b2:84:ff:45:9e:13:73:65:b4:82:d1:88:df:bf:8a
    (11:35:21) gnutls/x509: Key print: e5:95:8d:48:fe:10:d7:34:03:11:e8:c0:3b:b2:29:40:da:ba:2d:a3
    (11:35:21) gnutls/x509: Key print: 97:81:79:50:d8:1c:96:70:cc:34:d8:09:cf:79:44:31:36:7e:f4:74
    (11:35:21) gnutls: Peer provided 4 certs
    (11:35:21) gnutls: Lvl 0 SHA1 fingerprint: 4b:85:64:8b:05:12:6e:1b:b9:b1:1a:52:c5:ec:c4:f2:d5:82:e3:60
    (11:35:21) gnutls: Serial: 61:82:97:27:00:08:00:02:63:93
    (11:35:21) gnutls: Cert DN: C=US,L=Redmond,O=Microsoft,OU=UCG,CN=*.online.lync.com
    (11:35:21) gnutls: Cert Issuer DN: DC=com,DC=microsoft,DC=corp,DC=redmond,CN=Microsoft Secure Server Authority
    (11:35:21) gnutls: Lvl 1 SHA1 fingerprint: 3a:dd:0e:7e:a2:b2:84:ff:45:9e:13:73:65:b4:82:d1:88:df:bf:8a
    (11:35:21) gnutls: Serial: 61:03:33:36:00:05:00:00:00:30
    (11:35:21) gnutls: Cert DN: DC=com,DC=microsoft,DC=corp,DC=redmond,CN=Microsoft Secure Server Authority
    (11:35:21) gnutls: Cert Issuer DN: CN=Microsoft Internet Authority
    (11:35:21) gnutls: Lvl 2 SHA1 fingerprint: e5:95:8d:48:fe:10:d7:34:03:11:e8:c0:3b:b2:29:40:da:ba:2d:a3
    (11:35:21) gnutls: Serial: 07:27:62:02
    (11:35:21) gnutls: Cert DN: CN=Microsoft Internet Authority
    (11:35:21) gnutls: Cert Issuer DN: C=US,O=GTE Corporation,OU=GTE CyberTrust Solutions\, Inc.,CN=GTE CyberTrust Global Root
    (11:35:21) gnutls: Lvl 3 SHA1 fingerprint: 97:81:79:50:d8:1c:96:70:cc:34:d8:09:cf:79:44:31:36:7e:f4:74
    (11:35:21) gnutls: Serial: 01:a5
    (11:35:21) gnutls: Cert DN: C=US,O=GTE Corporation,OU=GTE CyberTrust Solutions\, Inc.,CN=GTE CyberTrust Global Root
    (11:35:21) gnutls: Cert Issuer DN: C=US,O=GTE Corporation,OU=GTE CyberTrust Solutions\, Inc.,CN=GTE CyberTrust Global Root
    (11:35:21) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:21) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:21) gnutls: lvl 2: ASSERT: x509.c:977
    (11:35:21) gnutls: lvl 2: ASSERT: x509.c:977
    (11:35:21) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:21) certificate/x509/tls_cached: Starting verify for webpoolbl20a04.infra.lync.com
    (11:35:21) certificate/x509/tls_cached: Checking for cached cert...
    (11:35:21) certificate/x509/tls_cached: ...Found cached cert
    (11:35:21) gnutls: Attempting to load X.509 certificate from /home/iksrazal/.purple/certificates/x509/tls_peers/webpoolbl20a04.infra.lync.com
    (11:35:21) certificate/x509/tls_cached: Peer cert matched cached
    (11:35:21) gnutls: lvl 2: ASSERT: common.c:836
    (11:35:21) util: Writing file /home/iksrazal/.purple/certificates/x509/tls_peers/webpoolbl20a04.infra.lync.com
    (11:35:21) certificate: Successfully verified certificate for webpoolbl20a04.infra.lync.com
    (11:35:21) sipe: sipe_http_transport_connected: webpoolbl20a04.infra.lync.com:443
    (11:35:21) sipe: sipe_schedule_allocate timeouts count 1 after addition
    (11:35:21) sipe: scheduling action <+http-timeout> timeout 60 seconds
    (11:35:21) sipe: 
    MESSAGE START >>>>>>>>>> HTTP - 2013-05-22T14:35:21.696440Z
    GET /CertProv/CertProvisioningService.svc/mex HTTP/1.1
    Host: webpoolbl20a04.infra.lync.com
    User-Agent: Sipe/1.15.1
    
    MESSAGE END >>>>>>>>>> HTTP - 2013-05-22T14:35:21.696440Z
    (11:35:21) sipe: sipe_schedule_remove: action name=<+http-timeout>
    (11:35:21) sipe: sipe_schedule_allocate timeouts count 1 after addition
    (11:35:21) sipe: scheduling action <+http-timeout> timeout 60 seconds
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet Application Data(23) with length: 120
    (11:35:21) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: ARCFOUR-128, MAC: MD5, Epoch: 1
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 141
    (11:35:21) sipe: transport_input_common: new buffer length 4096
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13852
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13852
    (11:35:21) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:21) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:21) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13852
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:21) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13852
    (11:35:21) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:21) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:21) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13852
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13852
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13852
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13852
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13852
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13852
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Decrypted Packet[1] Application Data(23) with length: 13836
    (11:35:22) sipe: transport_input_common: new buffer length 8192
    (11:35:22) sipe: transport_input_common: new buffer length 12288
    (11:35:22) sipe: transport_input_common: new buffer length 16384
    (11:35:22) sipe: 
    MESSAGE START <<<<<<<<<< HTTP - 2013-05-22T14:35:22.073926Z
    HTTP/1.1 200 OK
    Cache-Control: private
    Content-Length: 13480
    Content-Type: text/xml; charset=UTF-8
    Server: Microsoft-IIS/7.5
    X-AspNet-Version: 4.0.30319
    X-MS-Server-Fqdn: BL20A04FES08.infra.lync.com
    X-MS-Correlation-Id: 2147488492
    X-Powered-By: ASP.NET
    Date: Wed, 22 May 2013 20:35:24 GMT
    Set-Cookie: lync_cookie=1704200202.23313.0000; path=/
    
    <?xml version="1.0" encoding="utf-8"?><wsdl:definitions name="CertProvisioningService" targetNamespace="http://schemas.microsoft.com/OCS/AuthWebServices/" xmlns:wsdl="http://schemas.xmlsoap.org/wsdl/" xmlns:wsx="http://schemas.xmlsoap.org/ws/2004/09/mex" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wsa10="http://www.w3.org/2005/08/addressing" xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wsap="http://schemas.xmlsoap.org/ws/2004/08/addressing/policy" xmlns:msc="http://schemas.microsoft.com/ws/2005/12/wsdl/contract" xmlns:soap12="http://schemas.xmlsoap.org/wsdl/soap12/" xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing" xmlns:wsam="http://www.w3.org/2007/05/addressing/metadata" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:tns="http://schemas.microsoft.com/OCS/AuthWebServices/" xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:wsaw="http://www.w3.org/2006/05/addressing/wsdl" xmlns:soapenc="http://schemas.xmlsoap.org/
    soap/encoding/"><wsp:Policy wsu:Id="CertProvisioningServiceWebTicketProof_policy"><wsp:ExactlyOne><wsp:All><af:Binding xmlns:af="urn:component:Microsoft.Rtc.WebAuthentication.2010"/><sp:TransportBinding xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy><sp:TransportToken><wsp:Policy><sp:HttpsToken/></wsp:Policy></sp:TransportToken><sp:AlgorithmSuite><wsp:Policy><sp:Basic256Sha256/></wsp:Policy></sp:AlgorithmSuite><sp:Layout><wsp:Policy><sp:Strict/></wsp:Policy></sp:Layout><sp:IncludeTimestamp/></wsp:Policy></sp:TransportBinding><sp:EndorsingSupportingTokens xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy><sp:IssuedToken sp:IncludeToken="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient"><Issuer xmlns="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><Address xmlns="http://www.w3.org/2005/08/addressing">https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc</Address><Metadata xmlns="
    http://www.w3.org/2005/08/addressing"><Metadata xmlns="http://schemas.xmlsoap.org/ws/2004/09/mex" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><wsx:MetadataSection xmlns=""><wsx:MetadataReference><Address xmlns="http://www.w3.org/2005/08/addressing">https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/mex</Address></wsx:MetadataReference></wsx:MetadataSection></Metadata></Metadata></Issuer><sp:RequestSecurityTokenTemplate><trust:TokenType xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1</trust:TokenType><trust:KeyType xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://docs.oasis-open.org/ws-sx/ws-trust/200512/SymmetricKey</trust:KeyType><trust:KeySize xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">256</trust:KeySize><trust:KeyWrapAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p</trust:
    KeyWrapAlgorithm><trust:EncryptWith xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmlenc#aes256-cbc</trust:EncryptWith><trust:SignWith xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmldsig-more#hmac-sha256</trust:SignWith><trust:CanonicalizationAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/10/xml-exc-c14n#</trust:CanonicalizationAlgorithm><trust:EncryptionAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmlenc#aes256-cbc</trust:EncryptionAlgorithm><trust:KeySize xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">256</trust:KeySize><trust:ComputedKeyAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://docs.oasis-open.org/ws-sx/ws-trust/200512/CK/PSHA1</trust:ComputedKeyAlgorithm></sp:RequestSecurityTokenTemplate><wsp:Policy><sp:RequireInternalReference/></wsp:Policy></sp:IssuedToken></wsp:
    Policy></sp:EndorsingSupportingTokens><sp:Wss11 xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy/></sp:Wss11><sp:Trust13 xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy><sp:MustSupportIssuedTokens/><sp:RequireClientEntropy/><sp:RequireServerEntropy/></wsp:Policy></sp:Trust13><wsaw:UsingAddressing/></wsp:All></wsp:ExactlyOne></wsp:Policy><wsp:Policy wsu:Id="CertProvisioningServiceWebTicketProof_SHA1_policy"><wsp:ExactlyOne><wsp:All><af:Binding xmlns:af="urn:component:Microsoft.Rtc.WebAuthentication.2010"/><sp:TransportBinding xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy><sp:TransportToken><wsp:Policy><sp:HttpsToken/></wsp:Policy></sp:TransportToken><sp:AlgorithmSuite><wsp:Policy><sp:Basic256/></wsp:Policy></sp:AlgorithmSuite><sp:Layout><wsp:Policy><sp:Strict/></wsp:Policy></sp:Layout><sp:IncludeTimestamp/></wsp:Policy></sp:TransportBinding><sp:EndorsingSupportingTokens xmlns:sp="http://docs.oasis-open.org/ws-
    sx/ws-securitypolicy/200702"><wsp:Policy><sp:IssuedToken sp:IncludeToken="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient"><Issuer xmlns="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><Address xmlns="http://www.w3.org/2005/08/addressing">https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc</Address><Metadata xmlns="http://www.w3.org/2005/08/addressing"><Metadata xmlns="http://schemas.xmlsoap.org/ws/2004/09/mex" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><wsx:MetadataSection xmlns=""><wsx:MetadataReference><Address xmlns="http://www.w3.org/2005/08/addressing">https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/mex</Address></wsx:MetadataReference></wsx:MetadataSection></Metadata></Metadata></Issuer><sp:RequestSecurityTokenTemplate><trust:TokenType xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1</trust:TokenType><trust:KeyType 
    xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://docs.oasis-open.org/ws-sx/ws-trust/200512/SymmetricKey</trust:KeyType><trust:KeySize xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">256</trust:KeySize><trust:KeyWrapAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p</trust:KeyWrapAlgorithm><trust:EncryptWith xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmlenc#aes256-cbc</trust:EncryptWith><trust:SignWith xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2000/09/xmldsig#hmac-sha1</trust:SignWith><trust:CanonicalizationAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/10/xml-exc-c14n#</trust:CanonicalizationAlgorithm><trust:EncryptionAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmlenc#aes256-cbc</trust:EncryptionAlgorithm><trust:
    KeySize xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">256</trust:KeySize><trust:ComputedKeyAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://docs.oasis-open.org/ws-sx/ws-trust/200512/CK/PSHA1</trust:ComputedKeyAlgorithm></sp:RequestSecurityTokenTemplate><wsp:Policy><sp:RequireInternalReference/></wsp:Policy></sp:IssuedToken></wsp:Policy></sp:EndorsingSupportingTokens><sp:Wss11 xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy/></sp:Wss11><sp:Trust13 xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy><sp:MustSupportIssuedTokens/><sp:RequireClientEntropy/><sp:RequireServerEntropy/></wsp:Policy></sp:Trust13><wsaw:UsingAddressing/></wsp:All></wsp:ExactlyOne></wsp:Policy><wsdl:types><xsd:schema targetNamespace="http://schemas.microsoft.com/OCS/AuthWebServices/Imports"><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/CertProv/CertProvisioningService.svc/mex?xsd=xsd0" namespace="http://
    schemas.microsoft.com/OCS/AuthWebServices/"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/CertProv/CertProvisioningService.svc/mex?xsd=xsd1" namespace="http://schemas.xmlsoap.org/ws/2007/03/wstte/"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/CertProv/CertProvisioningService.svc/mex?xsd=xsd2" namespace="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/CertProv/CertProvisioningService.svc/mex?xsd=xsd3" namespace="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/CertProv/CertProvisioningService.svc/mex?xsd=xsd4" namespace="http://schemas.xmlsoap.org/ws/2006/12/authorization"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/CertProv/CertProvisioningService.svc/mex?xsd=xsd5" namespace="http://docs.oasis-open.org/ws-sx/ws-trust/200512/"/
    ><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/CertProv/CertProvisioningService.svc/mex?xsd=xsd6" namespace="http://schemas.microsoft.com/windows/pki/2009/01/enrollment"/></xsd:schema></wsdl:types><wsdl:message name="ResolveUserRequest"><wsdl:part name="ResolveUser" element="tns:ResolveUser"/></wsdl:message><wsdl:message name="ResolveUserResponse"><wsdl:part name="ResolveUserResponse" element="tns:ResolveUserResponse"/></wsdl:message><wsdl:message name="GetAndPublishCertRequest"><wsdl:part name="GetAndPublishCert" element="tns:GetAndPublishCert"/></wsdl:message><wsdl:message name="GetAndPublishCertResponse"><wsdl:part name="GetAndPublishCertResponse" element="tns:GetAndPublishCertResponse"/></wsdl:message><wsdl:portType name="CertProvisioningService"><wsdl:operation name="ResolveUser"><wsdl:input wsaw:Action="http://schemas.microsoft.com/OCS/AuthWebServices/ResolveUser" name="ResolveUserRequest" message="tns:ResolveUserRequest"/><wsdl:output wsaw:Action="http://schemas.microsoft.com/
    OCS/AuthWebServices/ResolveUserResponse" name="ResolveUserResponse" message="tns:ResolveUserResponse"/></wsdl:operation><wsdl:operation name="GetAndPublishCert"><wsdl:input wsaw:Action="http://schemas.microsoft.com/OCS/AuthWebServices/GetAndPublishCert" name="GetAndPublishCertRequest" message="tns:GetAndPublishCertRequest"/><wsdl:output wsaw:Action="http://schemas.microsoft.com/OCS/AuthWebServices/GetAndPublishCertResponse" name="GetAndPublishCertResponse" message="tns:GetAndPublishCertResponse"/></wsdl:operation></wsdl:portType><wsdl:binding name="CertProvisioningServiceWebTicketProof" type="tns:CertProvisioningService"><wsp:PolicyReference URI="#CertProvisioningServiceWebTicketProof_policy"/><soap:binding transport="http://schemas.xmlsoap.org/soap/http"/><wsdl:operation name="ResolveUser"><soap:operation soapAction="http://schemas.microsoft.com/OCS/AuthWebServices/ResolveUser" style="document"/><wsdl:input name="ResolveUserRequest"><soap:body use="literal"/></wsdl:input><wsdl:output name="
    ResolveUserResponse"><soap:body use="literal"/></wsdl:output></wsdl:operation><wsdl:operation name="GetAndPublishCert"><soap:operation soapAction="http://schemas.microsoft.com/OCS/AuthWebServices/GetAndPublishCert" style="document"/><wsdl:input name="GetAndPublishCertRequest"><soap:body use="literal"/></wsdl:input><wsdl:output name="GetAndPublishCertResponse"><soap:body use="literal"/></wsdl:output></wsdl:operation></wsdl:binding><wsdl:binding name="CertProvisioningServiceWebTicketProof_SHA1" type="tns:CertProvisioningService"><wsp:PolicyReference URI="#CertProvisioningServiceWebTicketProof_SHA1_policy"/><soap:binding transport="http://schemas.xmlsoap.org/soap/http"/><wsdl:operation name="ResolveUser"><soap:operation soapAction="http://schemas.microsoft.com/OCS/AuthWebServices/ResolveUser" style="document"/><wsdl:input name="ResolveUserRequest"><soap:body use="literal"/></wsdl:input><wsdl:output name="ResolveUserResponse"><soap:body use="literal"/></wsdl:output></wsdl:operation><wsdl:operation name="
    GetAndPublishCert"><soap:operation soapAction="http://schemas.microsoft.com/OCS/AuthWebServices/GetAndPublishCert" style="document"/><wsdl:input name="GetAndPublishCertRequest"><soap:body use="literal"/></wsdl:input><wsdl:output name="GetAndPublishCertResponse"><soap:body use="literal"/></wsdl:output></wsdl:operation></wsdl:binding><wsdl:service name="CertProvisioningService"><wsdl:port name="CertProvisioningServiceWebTicketProof" binding="tns:CertProvisioningServiceWebTicketProof"><soap:address location="https://webpoolbl20a04.infra.lync.com/CertProv/CertProvisioningService.svc/WebTicket_Proof"/><wsa10:EndpointReference><wsa10:Address>https://webpoolbl20a04.infra.lync.com/CertProv/CertProvisioningService.svc/WebTicket_Proof</wsa10:Address></wsa10:EndpointReference></wsdl:port><wsdl:port name="CertProvisioningServiceWebTicketProof_SHA1" binding="tns:CertProvisioningServiceWebTicketProof_SHA1"><soap:address location="https://webpoolbl20a04.infra.lync.com/CertProv/CertProvisioningService.svc/WebTicket_Proof_
    SHA1"/><wsa10:EndpointReference><wsa10:Address>https://webpoolbl20a04.infra.lync.com/CertProv/CertProvisioningService.svc/WebTicket_Proof_SHA1</wsa10:Address></wsa10:EndpointReference></wsdl:port></wsdl:service></wsdl:definitions>
    MESSAGE END <<<<<<<<<< HTTP - 2013-05-22T14:35:22.073926Z
    (11:35:22) sipe: sipe_http_request_response_callback: cookie: lync_cookie=1704200202.23313.0000
    (11:35:22) sipe: sipe_svc_https_response: code 200
    (11:35:22) sipe: webservice_metadata: metadata for service https://webpoolbl20a04.infra.lync.com:443/CertProv/CertProvisioningService.svc/mex retrieved successfully
    (11:35:22) sipe: webservice_metadata: WebTicket policy found
    (11:35:22) sipe: webservice_metadata: WebTicket URI https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc
    (11:35:22) sipe: webservice_metadata: authentication port found
    (11:35:22) sipe: webservice_metadata: Auth URI https://webpoolbl20a04.infra.lync.com/CertProv/CertProvisioningService.svc/WebTicket_Proof_SHA1
    (11:35:22) sipe: sipe_http_parse_uri: host 'webpoolbl20a04.infra.lync.com' port 443 path 'WebTicket/WebTicketService.svc/mex'
    (11:35:22) sipe: 
    MESSAGE START >>>>>>>>>> HTTP - 2013-05-22T14:35:22.085900Z
    GET /WebTicket/WebTicketService.svc/mex HTTP/1.1
    Host: webpoolbl20a04.infra.lync.com
    User-Agent: Sipe/1.15.1
    Cookie: lync_cookie=1704200202.23313.0000
    
    MESSAGE END >>>>>>>>>> HTTP - 2013-05-22T14:35:22.085900Z
    (11:35:22) sipe: sipe_schedule_remove: action name=<+http-timeout>
    (11:35:22) sipe: sipe_schedule_allocate timeouts count 1 after addition
    (11:35:22) sipe: scheduling action <+http-timeout> timeout 60 seconds
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet Application Data(23) with length: 136
    (11:35:22) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: ARCFOUR-128, MAC: MD5, Epoch: 1
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[3] Application Data(23) in epoch 1 and length: 157
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet Application Data(23) with length: 21
    (11:35:22) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: ARCFOUR-128, MAC: MD5, Epoch: 1
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[4] Application Data(23) in epoch 1 and length: 42
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13475
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13475
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13475
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13475
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13475
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13475
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13475
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13475
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: SSL 3.1 Application Data packet received. Epoch 0, length: 13475
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Expected Packet Application Data(23)
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Received Packet Application Data(23) with length: 13475
    (11:35:22) gnutls: lvl 4: REC[0x1cdf9d0]: Decrypted Packet[2] Application Data(23) with length: 13459
    (11:35:22) sipe: 
    MESSAGE START <<<<<<<<<< HTTP - 2013-05-22T14:35:22.651810Z
    HTTP/1.1 200 OK
    Cache-Control: private
    Content-Length: 13125
    Content-Type: text/xml; charset=UTF-8
    Server: Microsoft-IIS/7.5
    X-AspNet-Version: 4.0.30319
    X-MS-Server-Fqdn: BL20A04FES08.infra.lync.com
    X-MS-Correlation-Id: 2147504746
    X-Powered-By: ASP.NET
    X-Content-Type-Options: nosniff
    Date: Wed, 22 May 2013 20:35:25 GMT
    
    <?xml version="1.0" encoding="utf-8"?><wsdl:definitions name="WebTicketService" targetNamespace="http://tempuri.org/" xmlns:wsdl="http://schemas.xmlsoap.org/wsdl/" xmlns:wsx="http://schemas.xmlsoap.org/ws/2004/09/mex" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wsa10="http://www.w3.org/2005/08/addressing" xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wsap="http://schemas.xmlsoap.org/ws/2004/08/addressing/policy" xmlns:msc="http://schemas.microsoft.com/ws/2005/12/wsdl/contract" xmlns:soap12="http://schemas.xmlsoap.org/wsdl/soap12/" xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing" xmlns:wsam="http://www.w3.org/2007/05/addressing/metadata" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:tns="http://tempuri.org/" xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:wsaw="http://www.w3.org/2006/05/addressing/wsdl" xmlns:soapenc="http://schemas.xmlsoap.org/soap/encoding/"><wsp:Policy wsu:Id="WebTicketServiceMachineCert_
    policy"><wsp:ExactlyOne><wsp:All><sp:TransportBinding xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:TransportToken><wsp:Policy><sp:HttpsToken RequireClientCertificate="false"/></wsp:Policy></sp:TransportToken><sp:AlgorithmSuite><wsp:Policy><sp:Basic256/></wsp:Policy></sp:AlgorithmSuite><sp:Layout><wsp:Policy><sp:Strict/></wsp:Policy></sp:Layout><sp:IncludeTimestamp/></wsp:Policy></sp:TransportBinding><sp:EndorsingSupportingTokens xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:X509Token sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"><wsp:Policy><sp:RequireThumbprintReference/><sp:WssX509V3Token10/></wsp:Policy></sp:X509Token><sp:SignedParts><sp:Header Name="To" Namespace="http://www.w3.org/2005/08/addressing"/></sp:SignedParts></wsp:Policy></sp:EndorsingSupportingTokens><sp:Wss11 xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:MustSupportRefThumbprint/></wsp:
    Policy></sp:Wss11><sp:Trust10 xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:MustSupportIssuedTokens/><sp:RequireClientEntropy/><sp:RequireServerEntropy/></wsp:Policy></sp:Trust10><wsaw:UsingAddressing/></wsp:All></wsp:ExactlyOne></wsp:Policy><wsp:Policy wsu:Id="OAuth_policy"><wsp:ExactlyOne><wsp:All><http:OAuth xmlns:http="http://schemas.microsoft.com/ws/06/2004/policy/http"/><af:Binding xmlns:af="urn:component:Microsoft.Rtc.WebAuthentication.2010"/><sp:TransportBinding xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:TransportToken><wsp:Policy><sp:HttpsToken RequireClientCertificate="false"/></wsp:Policy></sp:TransportToken><sp:AlgorithmSuite><wsp:Policy><sp:Basic256/></wsp:Policy></sp:AlgorithmSuite><sp:Layout><wsp:Policy><sp:Strict/></wsp:Policy></sp:Layout></wsp:Policy></sp:TransportBinding></wsp:All></wsp:ExactlyOne></wsp:Policy><wsp:Policy wsu:Id="WebTicketServiceAnon_policy"><wsp:ExactlyOne><wsp:All><af:AnonAuthentication xmlns:af="urn:
    component:Microsoft.Rtc.WebAuthentication.2010"/><af:Binding xmlns:af="urn:component:Microsoft.Rtc.WebAuthentication.2010"/><sp:TransportBinding xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:TransportToken><wsp:Policy><sp:HttpsToken RequireClientCertificate="false"/></wsp:Policy></sp:TransportToken><sp:AlgorithmSuite><wsp:Policy><sp:Basic256/></wsp:Policy></sp:AlgorithmSuite><sp:Layout><wsp:Policy><sp:Lax/></wsp:Policy></sp:Layout></wsp:Policy></sp:TransportBinding><sp:SignedSupportingTokens xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:UsernameToken sp:IncludeToken="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient"><wsp:Policy><sp:WssUsernameToken10/></wsp:Policy></sp:UsernameToken></wsp:Policy></sp:SignedSupportingTokens><sp:Wss10 xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy/></sp:Wss10></wsp:All></wsp:ExactlyOne></wsp:Policy><wsp:Policy wsu:Id="WsFedPassive_policy"><wsp:
    ExactlyOne><wsp:All><af:WsFederationPassive af:passiveauthpage="https://webpoolbl20a04.infra.lync.com/PassiveAuth/PassiveAuth.aspx" xmlns:af="urn:component:Microsoft.Rtc.WebAuthentication.2010"/><sp:TransportBinding xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"><wsp:Policy><sp:TransportToken><wsp:Policy><sp:HttpsToken RequireClientCertificate="false"/></wsp:Policy></sp:TransportToken><sp:AlgorithmSuite><wsp:Policy><sp:Basic256/></wsp:Policy></sp:AlgorithmSuite><sp:Layout><wsp:Policy><sp:Strict/></wsp:Policy></sp:Layout></wsp:Policy></sp:TransportBinding></wsp:All></wsp:ExactlyOne></wsp:Policy><wsp:Policy wsu:Id="WsFedBearer_policy"><wsp:ExactlyOne><wsp:All><af:MSWebAuthentication xmlns:af="urn:component:Microsoft.Rtc.WebAuthentication.2010"><wsp:Policy><af:LiveIdEnvironment><af:Production/></af:LiveIdEnvironment></wsp:Policy></af:MSWebAuthentication><af:Binding xmlns:af="urn:component:Microsoft.Rtc.WebAuthentication.2010"/><sp:TransportBinding xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-
    securitypolicy/200702"><wsp:Policy><sp:TransportToken><wsp:Policy><sp:HttpsToken/></wsp:Policy></sp:TransportToken><sp:AlgorithmSuite><wsp:Policy><sp:TripleDes/></wsp:Policy></sp:AlgorithmSuite><sp:Layout><wsp:Policy><sp:Strict/></wsp:Policy></sp:Layout></wsp:Policy></sp:TransportBinding><sp:SignedSupportingTokens xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy><sp:IssuedToken sp:IncludeToken="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient"><Issuer xmlns="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><Address xmlns="http://www.w3.org/2005/08/addressing">http://login.live.com/</Address></Issuer><sp:RequestSecurityTokenTemplate><trust:TokenType xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">urn:oasis:names:tc:SAML:1.0:assertion</trust:TokenType><trust:KeyType xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://docs.oasis-open.org/ws-sx/ws-trust/200512/Bearer</trust:KeyType><trust:
    CanonicalizationAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/10/xml-exc-c14n#</trust:CanonicalizationAlgorithm><trust:EncryptionAlgorithm xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">http://www.w3.org/2001/04/xmlenc#tripledes-cbc</trust:EncryptionAlgorithm></sp:RequestSecurityTokenTemplate><wsp:Policy><sp:RequireInternalReference/></wsp:Policy></sp:IssuedToken></wsp:Policy></sp:SignedSupportingTokens><sp:Wss11 xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy/></sp:Wss11><sp:Trust13 xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"><wsp:Policy><sp:MustSupportIssuedTokens/><sp:RequireClientEntropy/><sp:RequireServerEntropy/></wsp:Policy></sp:Trust13><wsaw:UsingAddressing/></wsp:All></wsp:ExactlyOne></wsp:Policy><wsdl:types><xsd:schema targetNamespace="http://tempuri.org/Imports"><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/WebTicket/WebTicketService.svc/mex?xsd=xsd0" 
    namespace="http://schemas.microsoft.com/Message"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/WebTicket/WebTicketService.svc/mex?xsd=xsd2" namespace="urn:component:Microsoft.Rtc.WebAuthentication.2010"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/WebTicket/WebTicketService.svc/mex?xsd=xsd1" namespace="http://schemas.microsoft.com/2003/10/Serialization/"/><xsd:import schemaLocation="https://bl20a04fes08.infra.lync.com:4443/WebTicket/WebTicketService.svc/mex?xsd=xsd3" namespace="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/></xsd:schema></wsdl:types><wsdl:message name="IWebTicketService_IssueToken_InputMessage"><wsdl:part name="rst" type="q1:MessageBody" xmlns:q1="http://schemas.microsoft.com/Message"/></wsdl:message><wsdl:message name="IWebTicketService_IssueToken_OutputMessage"><wsdl:part name="IssueTokenResult" type="q2:MessageBody" xmlns:q2="http://schemas.microsoft.com/Message"/></wsdl:message><wsdl:message name="IWebTicketService_IssueToken_
    OCSDiagnosticsFaultFault_FaultMessage"><wsdl:part name="detail" element="q3:OCSDiagnosticsFault" xmlns:q3="urn:component:Microsoft.Rtc.WebAuthentication.2010"/></wsdl:message><wsdl:portType name="IWebTicketService"><wsdl:operation name="IssueToken"><wsdl:input wsaw:Action="http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue" message="tns:IWebTicketService_IssueToken_InputMessage"/><wsdl:output wsaw:Action="http://docs.oasis-open.org/ws-sx/ws-trust/200512/RSTRC/IssueFinal" message="tns:IWebTicketService_IssueToken_OutputMessage"/><wsdl:fault wsaw:Action="http://tempuri.org/IWebTicketService/IssueTokenOCSDiagnosticsFaultFault" name="OCSDiagnosticsFaultFault" message="tns:IWebTicketService_IssueToken_OCSDiagnosticsFaultFault_FaultMessage"/></wsdl:operation></wsdl:portType><wsdl:binding name="WebTicketServiceMachineCert" type="tns:IWebTicketService"><wsp:PolicyReference URI="#WebTicketServiceMachineCert_policy"/><soap:binding transport="http://schemas.xmlsoap.org/soap/http"/><wsdl:operation name="
    IssueToken"><soap:operation soapAction="http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue" style="document"/><wsdl:input><soap:body use="literal"/></wsdl:input><wsdl:output><soap:body use="literal"/></wsdl:output><wsdl:fault name="OCSDiagnosticsFaultFault"><soap:fault name="OCSDiagnosticsFaultFault" use="literal"/></wsdl:fault></wsdl:operation></wsdl:binding><wsdl:binding name="OAuth" type="tns:IWebTicketService"><wsp:PolicyReference URI="#OAuth_policy"/><soap:binding transport="http://schemas.xmlsoap.org/soap/http"/><wsdl:operation name="IssueToken"><soap:operation soapAction="http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue" style="document"/><wsdl:input><soap:body use="literal"/></wsdl:input><wsdl:output><soap:body use="literal"/></wsdl:output><wsdl:fault name="OCSDiagnosticsFaultFault"><soap:fault name="OCSDiagnosticsFaultFault" use="literal"/></wsdl:fault></wsdl:operation></wsdl:binding><wsdl:binding name="WebTicketServiceAnon" type="tns:IWebTicketService"><wsp:PolicyReference URI="#
    WebTicketServiceAnon_policy"/><soap:binding transport="http://schemas.xmlsoap.org/soap/http"/><wsdl:operation name="IssueToken"><soap:operation soapAction="http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue" style="document"/><wsdl:input><soap:body use="literal"/></wsdl:input><wsdl:output><soap:body use="literal"/></wsdl:output><wsdl:fault name="OCSDiagnosticsFaultFault"><soap:fault name="OCSDiagnosticsFaultFault" use="literal"/></wsdl:fault></wsdl:operation></wsdl:binding><wsdl:binding name="WsFedPassive" type="tns:IWebTicketService"><wsp:PolicyReference URI="#WsFedPassive_policy"/><soap:binding transport="http://schemas.xmlsoap.org/soap/http"/><wsdl:operation name="IssueToken"><soap:operation soapAction="http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue" style="document"/><wsdl:input><soap:body use="literal"/></wsdl:input><wsdl:output><soap:body use="literal"/></wsdl:output><wsdl:fault name="OCSDiagnosticsFaultFault"><soap:fault name="OCSDiagnosticsFaultFault" use="literal"/></wsdl:fault></
    wsdl:operation></wsdl:binding><wsdl:binding name="WsFedBearer" type="tns:IWebTicketService"><wsp:PolicyReference URI="#WsFedBearer_policy"/><soap:binding transport="http://schemas.xmlsoap.org/soap/http"/><wsdl:operation name="IssueToken"><soap:operation soapAction="http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue" style="document"/><wsdl:input><soap:body use="literal"/></wsdl:input><wsdl:output><soap:body use="literal"/></wsdl:output><wsdl:fault name="OCSDiagnosticsFaultFault"><soap:fault name="OCSDiagnosticsFaultFault" use="literal"/></wsdl:fault></wsdl:operation></wsdl:binding><wsdl:service name="WebTicketService"><wsdl:port name="WebTicketServiceMachineCert" binding="tns:WebTicketServiceMachineCert"><soap:address location="https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/MachineCert"/><wsa10:EndpointReference><wsa10:Address>https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/MachineCert</wsa10:Address></wsa10:EndpointReference></wsdl:port><wsdl:port name="
    OAuth" binding="tns:OAuth"><soap:address location="https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/OAuth"/></wsdl:port><wsdl:port name="WebTicketServiceAnon" binding="tns:WebTicketServiceAnon"><soap:address location="https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/Anon"/></wsdl:port><wsdl:port name="WsFedPassive" binding="tns:WsFedPassive"><soap:address location="https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/WsFed_passive"/></wsdl:port><wsdl:port name="WsFedBearer" binding="tns:WsFedBearer"><soap:address location="https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/WsFed_bearer"/><wsa10:EndpointReference><wsa10:Address>https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/WsFed_bearer</wsa10:Address></wsa10:EndpointReference></wsdl:port></wsdl:service></wsdl:definitions>
    MESSAGE END <<<<<<<<<< HTTP - 2013-05-22T14:35:22.651810Z
    (11:35:22) sipe: sipe_svc_https_response: code 200
    (11:35:22) sipe: webticket_metadata: metadata for service https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/mex retrieved successfully
    (11:35:22) sipe: webticket_metadata: WebTicket FedBearer Auth URI https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/WsFed_bearer
    (11:35:22) sipe: sipe_tls_fill_random: 256 bits -> 32 bytes
    (11:35:22) sipe: sipe_http_parse_uri: host 'login.microsoftonline.com' port 443 path 'getuserrealm.srf?login=rlazarski@mycompany.com&xml=1'
    (11:35:22) sipe: sipe_http_transport_new: new login.microsoftonline.com:443
    (11:35:22) sipe: transport_connect - hostname: login.microsoftonline.com port: 443
    (11:35:22) sipe: using SSL
    (11:35:22) dnsquery: Performing DNS lookup for login.microsoftonline.com
    (11:35:22) dns: Successfully sent DNS request to child 29351
    (11:35:22) dns: Got response for 'login.microsoftonline.com'
    (11:35:22) dnsquery: IP resolved for login.microsoftonline.com
    (11:35:22) proxy: Attempting connection to 157.56.53.213
    (11:35:22) proxy: Connecting to login.microsoftonline.com:443 with no proxy
    (11:35:22) proxy: Connection in progress
    (11:35:22) proxy: Connecting to login.microsoftonline.com:443.
    (11:35:22) proxy: Connected to login.microsoftonline.com:443.
    (11:35:22) gnutls: lvl 4: REC[0x1f52c80]: Allocating epoch #0
    (11:35:22) gnutls: Starting handshake with login.microsoftonline.com
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_constate.c:717
    (11:35:22) gnutls: lvl 4: REC[0x1f52c80]: Allocating epoch #1
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 (00.66)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 (00.05)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: Keeping ciphersuite: RSA_ARCFOUR_MD5 (00.04)
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: Sending extension SAFE RENEGOTIATION (1 bytes)
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: Sending extension SUPPORTED ECC (12 bytes)
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (4.1) RSA-SHA256
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (4.2) DSA-SHA256
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (4.3) ECDSA-SHA256
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (5.1) RSA-SHA384
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (5.3) ECDSA-SHA384
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (6.1) RSA-SHA512
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (6.3) ECDSA-SHA512
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (3.1) RSA-SHA224
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (3.2) DSA-SHA224
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (3.3) ECDSA-SHA224
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (2.1) RSA-SHA1
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (2.2) DSA-SHA1
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: sent signature algo (2.3) ECDSA-SHA1
    (11:35:22) gnutls: lvl 3: EXT[0x1f52c80]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
    (11:35:22) gnutls: lvl 3: HSK[0x1f52c80]: CLIENT HELLO was queued [184 bytes]
    (11:35:22) gnutls: lvl 4: REC[0x1f52c80]: Preparing Packet Handshake(22) with length: 184
    (11:35:22) gnutls: lvl 9: ENC[0x1f52c80]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:22) gnutls: lvl 4: REC[0x1f52c80]: Sent Packet[1] Handshake(22) in epoch 0 and length: 189
    (11:35:22) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:23) util: Writing file accounts.xml to directory /home/iksrazal/.purple
    (11:35:23) util: Writing file /home/iksrazal/.purple/accounts.xml
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: SSL 3.1 Handshake packet received. Epoch 0, length: 4397
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Expected Packet Handshake(22)
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Received Packet Handshake(22) with length: 4397
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: SSL 3.1 Handshake packet received. Epoch 0, length: 4397
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Expected Packet Handshake(22)
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Received Packet Handshake(22) with length: 4397
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: SSL 3.1 Handshake packet received. Epoch 0, length: 4397
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Expected Packet Handshake(22)
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Received Packet Handshake(22) with length: 4397
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Decrypted Packet[0] Handshake(22) with length: 4397
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: SERVER HELLO was received. Length 77[4393], frag offset 0, frag length: 77, sequence: 0
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: Server's version: 3.1
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: SessionID length: 32
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: SessionID: 6b04000086bebec1b3f316754638b2482fba18da4e0f50c638c85ba236a8a362
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: Selected cipher suite: RSA_AES_128_CBC_SHA1
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: Selected compression method: NULL (0)
    (11:35:23) gnutls: lvl 3: EXT[0x1f52c80]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: Safe renegotiation succeeded
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: CERTIFICATE was received. Length 4308[4312], frag offset 0, frag length: 4308, sequence: 0
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1168
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:966
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1168
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1150
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: CLIENT KEY EXCHANGE was queued [262 bytes]
    (11:35:23) gnutls: lvl 3: REC[0x1f52c80]: Sent ChangeCipherSpec
    (11:35:23) gnutls: lvl 9: INT: PREMASTER SECRET[48]: 030348c83f5f2a24810b53eee2725f870b86416ea430b83aa4f59b35fe921879551ee53226000c021e20a9b1a9b1732f
    (11:35:23) gnutls: lvl 9: INT: CLIENT RANDOM[32]: 519cd7aa85088633ed1049d6fe85fa55597c755f2885ef624275e797aa115ab8
    (11:35:23) gnutls: lvl 9: INT: SERVER RANDOM[32]: 519d2c0f9b71d20a2095e925488beb70eb6690a7958c76290824eb6131b67244
    (11:35:23) gnutls: lvl 9: INT: MASTER SECRET: 412589c73dfb76fcc49de0ba793ff4f2c29883b07020eccb25f6197dd2f45850061c60f42308102fb5b94006d7b10225
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Initializing epoch #1
    (11:35:23) gnutls: lvl 9: INT: KEY BLOCK[104]: 88ddbb5f80c099f18a338ffa13a502816eab407d687f1f2e32a6245b4115d24e
    (11:35:23) gnutls: lvl 9: INT: CLIENT WRITE KEY [16]: a6d79bbdc6a23e1fcf99635ce35da613
    (11:35:23) gnutls: lvl 9: INT: SERVER WRITE KEY [16]: 43651dd1c52a70efeae588f7ff085e04
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Epoch #1 ready
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: Cipher Suite: RSA_AES_128_CBC_SHA1
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: Initializing internal [write] cipher sessions
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: recording tls-unique CB (send)
    (11:35:23) gnutls: lvl 3: HSK[0x1f52c80]: FINISHED was queued [16 bytes]
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Preparing Packet Handshake(22) with length: 262
    (11:35:23) gnutls: lvl 9: ENC[0x1f52c80]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Sent Packet[2] Handshake(22) in epoch 0 and length: 267
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Preparing Packet ChangeCipherSpec(20) with length: 1
    (11:35:23) gnutls: lvl 9: ENC[0x1f52c80]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Preparing Packet Handshake(22) with length: 16
    (11:35:23) gnutls: lvl 9: ENC[0x1f52c80]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:23) gnutls: lvl 4: REC[0x1f52c80]: Sent Packet[1] Handshake(22) in epoch 1 and length: 229
    (11:35:23) gnutls: lvl 2: ASSERT: session_ticket.c:684
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:23) gnutls: lvl 2: ASSERT: gnutls_handshake.c:2696
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Expected Packet ChangeCipherSpec(20)
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Received Packet ChangeCipherSpec(20) with length: 1
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Decrypted Packet[1] ChangeCipherSpec(20) with length: 1
    (11:35:24) gnutls: lvl 3: HSK[0x1f52c80]: Cipher Suite: RSA_AES_128_CBC_SHA1
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: SSL 3.1 Handshake packet received. Epoch 0, length: 48
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Expected Packet Handshake(22)
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Received Packet Handshake(22) with length: 48
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Decrypted Packet[0] Handshake(22) with length: 16
    (11:35:24) gnutls: lvl 3: HSK[0x1f52c80]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Start of epoch cleanup
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Epoch #0 freed
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: End of epoch cleanup
    (11:35:24) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:24) gnutls: lvl 2: ASSERT: mpi.c:249
    (11:35:24) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:24) gnutls: Handshake complete
    (11:35:24) gnutls/x509: Key print: 09:64:6e:bc:fd:ec:0d:18:a5:9a:49:20:49:03:6e:24:aa:3c:2d:7f
    (11:35:24) gnutls/x509: Key print: 2b:ac:95:6c:4e:e4:7f:9d:5c:1e:05:ae:8e:d7:f9:5d:47:c2:1f:80
    (11:35:24) gnutls/x509: Key print: f4:a8:0a:0c:d1:e6:cf:19:0b:8c:bc:6f:bc:99:17:11:d4:82:c9:d0
    (11:35:24) gnutls: Peer provided 3 certs
    (11:35:24) gnutls: Lvl 0 SHA1 fingerprint: 09:64:6e:bc:fd:ec:0d:18:a5:9a:49:20:49:03:6e:24:aa:3c:2d:7f
    (11:35:24) gnutls: Serial: 22:8b:d8:48:7e:25:a1:05:4b:ad:6b:e5:dd:3c:03:6c
    (11:35:24) gnutls: lvl 2: ASSERT: dn.c:286
    (11:35:24) gnutls: Cert DN: 
    (11:35:24) gnutls: Cert Issuer DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL CA
    (11:35:24) gnutls: Lvl 1 SHA1 fingerprint: 2b:ac:95:6c:4e:e4:7f:9d:5c:1e:05:ae:8e:d7:f9:5d:47:c2:1f:80
    (11:35:24) gnutls: Serial: 5b:77:59:c6:17:84:e1:5e:c7:27:c0:32:95:29:28:6b
    (11:35:24) gnutls: Cert DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL CA
    (11:35:24) gnutls: Cert Issuer DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5
    (11:35:24) gnutls: Lvl 2 SHA1 fingerprint: f4:a8:0a:0c:d1:e6:cf:19:0b:8c:bc:6f:bc:99:17:11:d4:82:c9:d0
    (11:35:24) gnutls: Serial: 35:97:31:87:f3:87:3a:07:32:7e:ce:58:0c:9b:7e:da
    (11:35:24) gnutls: Cert DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5
    (11:35:24) gnutls: Cert Issuer DN: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority
    (11:35:24) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:24) gnutls: lvl 2: ASSERT: mpi.c:249
    (11:35:24) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:24) certificate/x509/tls_cached: Starting verify for login.microsoftonline.com
    (11:35:24) certificate/x509/tls_cached: Checking for cached cert...
    (11:35:24) certificate/x509/tls_cached: ...Found cached cert
    (11:35:24) gnutls: Attempting to load X.509 certificate from /home/iksrazal/.purple/certificates/x509/tls_peers/login.microsoftonline.com
    (11:35:24) certificate/x509/tls_cached: Peer cert matched cached
    (11:35:24) gnutls: lvl 2: ASSERT: common.c:836
    (11:35:24) util: Writing file /home/iksrazal/.purple/certificates/x509/tls_peers/login.microsoftonline.com
    (11:35:24) certificate: Successfully verified certificate for login.microsoftonline.com
    (11:35:24) sipe: sipe_http_transport_connected: login.microsoftonline.com:443
    (11:35:24) sipe: 
    MESSAGE START >>>>>>>>>> HTTP - 2013-05-22T14:35:24.314719Z
    GET /getuserrealm.srf?login=rlazarski@mycompany.com&xml=1 HTTP/1.1
    Host: login.microsoftonline.com
    User-Agent: Sipe/1.15.1
    Cookie: lync_cookie=1704200202.23313.0000
    
    MESSAGE END >>>>>>>>>> HTTP - 2013-05-22T14:35:24.314719Z
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Preparing Packet Application Data(23) with length: 173
    (11:35:24) gnutls: lvl 9: ENC[0x1f52c80]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Sent Packet[2] Application Data(23) in epoch 1 and length: 261
    (11:35:24) sipe: transport_input_common: new buffer length 4096
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: SSL 3.1 Application Data packet received. Epoch 0, length: 352
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Expected Packet Application Data(23)
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Received Packet Application Data(23) with length: 352
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Decrypted Packet[1] Application Data(23) with length: 331
    (11:35:24) sipe: sipe_http_transport_input: body too short (0 < 160, strlen 329) - ignoring message
    (11:35:24) sipe: transport_input_common: new buffer length 8192
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: SSL 3.1 Application Data packet received. Epoch 0, length: 192
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Expected Packet Application Data(23)
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Received Packet Application Data(23) with length: 192
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Decrypted Packet[2] Application Data(23) with length: 160
    (11:35:24) sipe: 
    MESSAGE START <<<<<<<<<< HTTP - 2013-05-22T14:35:24.692061Z
    HTTP/1.1 200 OK
    Cache-Control: no-cache
    Pragma: no-cache
    Content-Length: 160
    Content-Type: text/xml
    Expires: Wed, 22 May 2013 20:34:27 GMT
    Server: Microsoft-IIS/7.5
    P3P: CP="DSP CUR OTPi IND OTRi ONL FIN"
    X-XSS-Protection: 0
    PPServer: PPV: 30 H: CO1IDOLGN62 V: 0
    Date: Wed, 22 May 2013 20:35:27 GMT
    Connection: close
    
    <RealmInfo Success="true"><State>4</State><UserState>1</UserState><Login>rlazarski@mycompany.com</Login><NameSpaceType>Managed</NameSpaceType></RealmInfo>
    
    MESSAGE END <<<<<<<<<< HTTP - 2013-05-22T14:35:24.692061Z
    (11:35:24) sipe: sipe_svc_https_response: code 200
    (11:35:24) sipe: realminfo: data for user rlazarski@mycompany.com retrieved successfully
    (11:35:24) sipe: realminfo: no RealmInfo found or no ADFS setup detected - try direct login
    (11:35:24) sipe: sipe_http_parse_uri: host 'login.microsoftonline.com' port 443 path 'RST2.srf'
    (11:35:24) sipe: sipe_http_transport_input: server requested close 'login.microsoftonline.com:443'
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_buffers.c:575
    (11:35:24) gnutls: lvl 4: REC: Sending Alert[1|0] - Close notify
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Preparing Packet Alert(21) with length: 2
    (11:35:24) gnutls: lvl 9: ENC[0x1f52c80]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Sent Packet[3] Alert(21) in epoch 1 and length: 165
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_buffers.c:482
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_record.c:876
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_record.c:986
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_record.c:1150
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Start of epoch cleanup
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: End of epoch cleanup
    (11:35:24) gnutls: lvl 4: REC[0x1f52c80]: Epoch #1 freed
    (11:35:24) sipe: sipe_http_transport_new: re-establishing login.microsoftonline.com:443
    (11:35:24) sipe: transport_connect - hostname: login.microsoftonline.com port: 443
    (11:35:24) sipe: using SSL
    (11:35:24) dnsquery: Performing DNS lookup for login.microsoftonline.com
    (11:35:24) dns: Successfully sent DNS request to child 29351
    (11:35:24) sipe: transport_deferred_destroy: 0x1964e20
    (11:35:24) dns: Got response for 'login.microsoftonline.com'
    (11:35:24) dnsquery: IP resolved for login.microsoftonline.com
    (11:35:24) proxy: Attempting connection to 157.56.53.213
    (11:35:24) proxy: Connecting to login.microsoftonline.com:443 with no proxy
    (11:35:24) proxy: Connection in progress
    (11:35:24) proxy: Connecting to login.microsoftonline.com:443.
    (11:35:24) proxy: Connected to login.microsoftonline.com:443.
    (11:35:24) gnutls: lvl 4: REC[0x20185f0]: Allocating epoch #0
    (11:35:24) gnutls: Starting handshake with login.microsoftonline.com
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_constate.c:717
    (11:35:24) gnutls: lvl 4: REC[0x20185f0]: Allocating epoch #1
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1 (C0.09)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256 (C0.23)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256 (C0.2B)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1 (C0.0A)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384 (C0.24)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384 (C0.2C)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1 (C0.08)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA1 (00.33)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_AES_128_CBC_SHA256 (00.67)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 (00.45)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_AES_128_GCM_SHA256 (00.9E)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA1 (00.39)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_AES_256_CBC_SHA256 (00.6B)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 (00.88)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 (00.16)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA1 (00.32)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_AES_128_CBC_SHA256 (00.40)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 (00.44)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_AES_128_GCM_SHA256 (00.A2)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA1 (00.38)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_AES_256_CBC_SHA256 (00.6A)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 (00.87)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 (00.13)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: DHE_DSS_ARCFOUR_SHA1 (00.66)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_ARCFOUR_SHA1 (00.05)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: Keeping ciphersuite: RSA_ARCFOUR_MD5 (00.04)
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: Sending extension SAFE RENEGOTIATION (1 bytes)
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: Sending extension SUPPORTED ECC (12 bytes)
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (4.1) RSA-SHA256
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (4.2) DSA-SHA256
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (4.3) ECDSA-SHA256
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (5.1) RSA-SHA384
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (5.3) ECDSA-SHA384
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (6.1) RSA-SHA512
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (6.3) ECDSA-SHA512
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (3.1) RSA-SHA224
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (3.2) DSA-SHA224
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (3.3) ECDSA-SHA224
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (2.1) RSA-SHA1
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (2.2) DSA-SHA1
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: sent signature algo (2.3) ECDSA-SHA1
    (11:35:24) gnutls: lvl 3: EXT[0x20185f0]: Sending extension SIGNATURE ALGORITHMS (28 bytes)
    (11:35:24) gnutls: lvl 3: HSK[0x20185f0]: CLIENT HELLO was queued [184 bytes]
    (11:35:24) gnutls: lvl 4: REC[0x20185f0]: Preparing Packet Handshake(22) with length: 184
    (11:35:24) gnutls: lvl 9: ENC[0x20185f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:24) gnutls: lvl 4: REC[0x20185f0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 189
    (11:35:24) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 4397
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Expected Packet Handshake(22)
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Received Packet Handshake(22) with length: 4397
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:494
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_record.c:1002
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 4397
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Expected Packet Handshake(22)
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Received Packet Handshake(22) with length: 4397
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Decrypted Packet[0] Handshake(22) with length: 4397
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: SERVER HELLO was received. Length 77[4393], frag offset 0, frag length: 77, sequence: 0
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: Server's version: 3.1
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: SessionID length: 32
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: SessionID: cd3b0000ea9422cc935d5245bd803a2eb10978ce34eddf6423baa563865534f5
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: Selected cipher suite: RSA_AES_128_CBC_SHA1
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: Selected compression method: NULL (0)
    (11:35:25) gnutls: lvl 3: EXT[0x20185f0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: Safe renegotiation succeeded
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: CERTIFICATE was received. Length 4308[4312], frag offset 0, frag length: 4308, sequence: 0
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1168
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: SERVER HELLO DONE was received. Length 0[0], frag offset 0, frag length: 1, sequence: 0
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:966
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1168
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_buffers.c:1150
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: CLIENT KEY EXCHANGE was queued [262 bytes]
    (11:35:25) gnutls: lvl 3: REC[0x20185f0]: Sent ChangeCipherSpec
    (11:35:25) gnutls: lvl 9: INT: PREMASTER SECRET[48]: 030334feb6ad5bbb32c8d94c10f8eddb63449f12034c0b81fed949fd0ffae290167a0c812e0d984b8eb6074466c3e84c
    (11:35:25) gnutls: lvl 9: INT: CLIENT RANDOM[32]: 519cd7acb8b463f0ed45568f2749be08a16dd6b3786442ab1fbaab16c8f53638
    (11:35:25) gnutls: lvl 9: INT: SERVER RANDOM[32]: 519d2c10fc99ba473a7f236a6e2c86d38e6932a473175b291ad15258240e398a
    (11:35:25) gnutls: lvl 9: INT: MASTER SECRET: 9c52ec0500928c48aa01948a16b176123faa7e652c51427643c64e9fa0722c114d49025781d8ef6121aa7e4bf33c715c
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Initializing epoch #1
    (11:35:25) gnutls: lvl 9: INT: KEY BLOCK[104]: f999188405dcc1262407e0e259853f620cf7e5866ebf44649d80d3d6f06f4b2e
    (11:35:25) gnutls: lvl 9: INT: CLIENT WRITE KEY [16]: d3c6e705556f71a53f02c0db5cff2eba
    (11:35:25) gnutls: lvl 9: INT: SERVER WRITE KEY [16]: d48229bcb307addc8efc6f87e18940c5
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Epoch #1 ready
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: Cipher Suite: RSA_AES_128_CBC_SHA1
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: Initializing internal [write] cipher sessions
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: recording tls-unique CB (send)
    (11:35:25) gnutls: lvl 3: HSK[0x20185f0]: FINISHED was queued [16 bytes]
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Preparing Packet Handshake(22) with length: 262
    (11:35:25) gnutls: lvl 9: ENC[0x20185f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 267
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Preparing Packet ChangeCipherSpec(20) with length: 1
    (11:35:25) gnutls: lvl 9: ENC[0x20185f0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Sent Packet[3] ChangeCipherSpec(20) in epoch 0 and length: 6
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Preparing Packet Handshake(22) with length: 16
    (11:35:25) gnutls: lvl 9: ENC[0x20185f0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:25) gnutls: lvl 4: REC[0x20185f0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 69
    (11:35:25) gnutls: lvl 2: ASSERT: session_ticket.c:684
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:25) gnutls: lvl 2: ASSERT: gnutls_handshake.c:2696
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Expected Packet ChangeCipherSpec(20)
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Received Packet ChangeCipherSpec(20) with length: 1
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Decrypted Packet[1] ChangeCipherSpec(20) with length: 1
    (11:35:32) gnutls: lvl 3: HSK[0x20185f0]: Cipher Suite: RSA_AES_128_CBC_SHA1
    (11:35:32) gnutls: lvl 2: ASSERT: gnutls_buffers.c:974
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: SSL 3.1 Handshake packet received. Epoch 0, length: 48
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Expected Packet Handshake(22)
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Received Packet Handshake(22) with length: 48
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Decrypted Packet[0] Handshake(22) with length: 16
    (11:35:32) gnutls: lvl 3: HSK[0x20185f0]: FINISHED was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Start of epoch cleanup
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Epoch #0 freed
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: End of epoch cleanup
    (11:35:32) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:32) gnutls: lvl 2: ASSERT: mpi.c:249
    (11:35:32) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:32) gnutls: Handshake complete
    (11:35:32) gnutls/x509: Key print: 09:64:6e:bc:fd:ec:0d:18:a5:9a:49:20:49:03:6e:24:aa:3c:2d:7f
    (11:35:32) gnutls/x509: Key print: 2b:ac:95:6c:4e:e4:7f:9d:5c:1e:05:ae:8e:d7:f9:5d:47:c2:1f:80
    (11:35:32) gnutls/x509: Key print: f4:a8:0a:0c:d1:e6:cf:19:0b:8c:bc:6f:bc:99:17:11:d4:82:c9:d0
    (11:35:32) gnutls: Peer provided 3 certs
    (11:35:32) gnutls: Lvl 0 SHA1 fingerprint: 09:64:6e:bc:fd:ec:0d:18:a5:9a:49:20:49:03:6e:24:aa:3c:2d:7f
    (11:35:32) gnutls: Serial: 22:8b:d8:48:7e:25:a1:05:4b:ad:6b:e5:dd:3c:03:6c
    (11:35:32) gnutls: lvl 2: ASSERT: dn.c:286
    (11:35:32) gnutls: Cert DN: 
    (11:35:32) gnutls: Cert Issuer DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL CA
    (11:35:32) gnutls: Lvl 1 SHA1 fingerprint: 2b:ac:95:6c:4e:e4:7f:9d:5c:1e:05:ae:8e:d7:f9:5d:47:c2:1f:80
    (11:35:32) gnutls: Serial: 5b:77:59:c6:17:84:e1:5e:c7:27:c0:32:95:29:28:6b
    (11:35:32) gnutls: Cert DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.verisign.com/rpa (c)06,CN=VeriSign Class 3 Extended Validation SSL CA
    (11:35:32) gnutls: Cert Issuer DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5
    (11:35:32) gnutls: Lvl 2 SHA1 fingerprint: f4:a8:0a:0c:d1:e6:cf:19:0b:8c:bc:6f:bc:99:17:11:d4:82:c9:d0
    (11:35:32) gnutls: Serial: 35:97:31:87:f3:87:3a:07:32:7e:ce:58:0c:9b:7e:da
    (11:35:32) gnutls: Cert DN: C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=(c) 2006 VeriSign\, Inc. - For authorized use only,CN=VeriSign Class 3 Public Primary Certification Authority - G5
    (11:35:32) gnutls: Cert Issuer DN: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification Authority
    (11:35:32) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:32) gnutls: lvl 2: ASSERT: mpi.c:249
    (11:35:32) gnutls: lvl 2: ASSERT: dn.c:1190
    (11:35:32) certificate/x509/tls_cached: Starting verify for login.microsoftonline.com
    (11:35:32) certificate/x509/tls_cached: Checking for cached cert...
    (11:35:32) certificate/x509/tls_cached: ...Found cached cert
    (11:35:32) gnutls: Attempting to load X.509 certificate from /home/iksrazal/.purple/certificates/x509/tls_peers/login.microsoftonline.com
    (11:35:32) certificate/x509/tls_cached: Peer cert matched cached
    (11:35:32) gnutls: lvl 2: ASSERT: common.c:836
    (11:35:32) util: Writing file /home/iksrazal/.purple/certificates/x509/tls_peers/login.microsoftonline.com
    (11:35:32) certificate: Successfully verified certificate for login.microsoftonline.com
    (11:35:32) sipe: sipe_http_transport_connected: login.microsoftonline.com:443
    (11:35:32) sipe: 
    MESSAGE START >>>>>>>>>> HTTP - 2013-05-22T14:35:32.659458Z
    POST /RST2.srf HTTP/1.1
    Host: login.microsoftonline.com
    User-Agent: Sipe/1.15.1
    SOAPAction: "http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue"
    Cookie: lync_cookie=1704200202.23313.0000
    Content-Length: 1319
    Content-Type: text/xml
    
    <?xml version="1.0"?>
    <soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope" xmlns:wst="http://schemas.xmlsoap.org/ws/2005/02/trust" xmlns:auth="http://schemas.xmlsoap.org/ws/2006/12/authorization" xmlns:wsa="http://www.w3.org/2005/08/addressing" xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" ><soap:Header> <wsa:To>https://login.microsoftonline.com:443/RST2.srf</wsa:To> <wsa:ReplyTo>  <wsa:Address>http://www.w3.org/2005/08/addressing/anonymous</wsa:Address> </wsa:ReplyTo> <wsa:Action>http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue</wsa:Action> <wsse:Security><wsse:UsernameToken> <wsse:Username>rlazarski@mycompany.com</wsse:Username> <wsse:Password></wsse:Password></wsse:UsernameToken></wsse:Security></soap:Header> <soap:Body><wst:RequestSecurityToken> <wst:RequestType>http://schemas.xmlsoap.org/ws/2005/02/trust/
    Issue</wst:RequestType> <wsp:AppliesTo>  <wsa:EndpointReference>   <wsa:Address>https://webpoolbl20a04.infra.lync.com/WebTicket/WebTicketService.svc/WsFed_bearer</wsa:Address>  </wsa:EndpointReference> </wsp:AppliesTo> </wst:RequestSecurityToken></soap:Body></soap:Envelope>
    MESSAGE END >>>>>>>>>> HTTP - 2013-05-22T14:35:32.659458Z
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Preparing Packet Application Data(23) with length: 1562
    (11:35:32) gnutls: lvl 9: ENC[0x20185f0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:32) gnutls: lvl 4: REC[0x20185f0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 1621
    (11:35:34) sipe: transport_input_common: new buffer length 4096
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: SSL 3.1 Application Data packet received. Epoch 0, length: 384
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Expected Packet Application Data(23)
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Received Packet Application Data(23) with length: 384
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Decrypted Packet[1] Application Data(23) with length: 358
    (11:35:34) sipe: sipe_http_transport_input: body too short (0 < 886, strlen 356) - ignoring message
    (11:35:34) sipe: transport_input_common: new buffer length 8192
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: SSL 3.1 Application Data packet received. Epoch 0, length: 912
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Expected Packet Application Data(23)
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Received Packet Application Data(23) with length: 912
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Decrypted Packet[2] Application Data(23) with length: 886
    (11:35:34) sipe: 
    MESSAGE START <<<<<<<<<< HTTP - 2013-05-22T14:35:34.403905Z
    HTTP/1.1 200 OK
    Cache-Control: no-cache
    Pragma: no-cache
    Content-Length: 886
    Content-Type: application/soap+xml; charset=utf-8
    Expires: Wed, 22 May 2013 20:34:37 GMT
    Server: Microsoft-IIS/7.5
    P3P: CP="DSP CUR OTPi IND OTRi ONL FIN"
    X-XSS-Protection: 0
    PPServer: PPV: 30 H: CO1IDOLGN65 V: 0
    Date: Wed, 22 May 2013 20:35:37 GMT
    Connection: close
    
    <?xml version="1.0" encoding="utf-8" ?><S:Envelope xmlns:S="http://www.w3.org/2003/05/soap-envelope" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wst="http://schemas.xmlsoap.org/ws/2005/02/trust" xmlns:psf="http://schemas.microsoft.com/Passport/SoapServices/SOAPFault"><S:Body><S:Fault><S:Code><S:Value>S:Sender</S:Value><S:Subcode><S:Value>wst:FailedAuthentication</S:Value></S:Subcode></S:Code><S:Reason><S:Text xml:lang="en-US">Authentication Failure</S:Text></S:Reason><S:Detail><psf:error><psf:value>0x80048821</psf:value><psf:internalerror><psf:code>0x80041012</psf:code><psf:text>The entered and stored passwords do not match.&#x000D;&#x000A;</psf:text></psf:internalerror></psf:error></S:Detail></S:Fault></S:Body></S:Envelope>
    MESSAGE END <<<<<<<<<< HTTP - 2013-05-22T14:35:34.403905Z
    (11:35:34) sipe: sipe_svc_https_response: code 200
    (11:35:34) connection: Connection error on 0x1c22290 (reason: 2 description: Web ticket request to https://webpoolbl20a04.infra.lync.com:443/CertProv/CertProvisioningService.svc failed
    (The entered and stored passwords do not match.))
    (11:35:34) sipe: sipe_http_transport_input: server requested close 'login.microsoftonline.com:443'
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_buffers.c:575
    (11:35:34) gnutls: lvl 4: REC: Sending Alert[1|0] - Close notify
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Preparing Packet Alert(21) with length: 2
    (11:35:34) gnutls: lvl 9: ENC[0x20185f0]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Sent Packet[3] Alert(21) in epoch 1 and length: 133
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_buffers.c:482
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_record.c:876
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_record.c:986
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_record.c:1150
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Start of epoch cleanup
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: End of epoch cleanup
    (11:35:34) gnutls: lvl 4: REC[0x20185f0]: Epoch #1 freed
    (11:35:34) account: Disconnecting account rlazarski@mycompany.com,rlazarski@mycompany.com (0x11e65c0)
    (11:35:34) connection: Disconnecting connection 0x1c22290
    (11:35:34) sipe: sipe_schedule_remove: action name=<+http-timeout>
    (11:35:34) sipe: sipe_http_transport_free: destroying connection 'login.microsoftonline.com:443'
    (11:35:34) sipe: sipe_http_transport_free: destroying connection 'webpoolbl20a04.infra.lync.com:443'
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_buffers.c:575
    (11:35:34) gnutls: lvl 4: REC: Sending Alert[1|0] - Close notify
    (11:35:34) gnutls: lvl 4: REC[0x1cdf9d0]: Preparing Packet Alert(21) with length: 2
    (11:35:34) gnutls: lvl 9: ENC[0x1cdf9d0]: cipher: ARCFOUR-128, MAC: MD5, Epoch: 1
    (11:35:34) gnutls: lvl 4: REC[0x1cdf9d0]: Sent Packet[5] Alert(21) in epoch 1 and length: 23
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_record.c:230
    (11:35:34) gnutls: lvl 4: REC[0x1cdf9d0]: Start of epoch cleanup
    (11:35:34) gnutls: lvl 4: REC[0x1cdf9d0]: End of epoch cleanup
    (11:35:34) gnutls: lvl 4: REC[0x1cdf9d0]: Epoch #1 freed
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_buffers.c:575
    (11:35:34) gnutls: lvl 4: REC: Sending Alert[1|0] - Close notify
    (11:35:34) gnutls: lvl 4: REC[0x1d70500]: Preparing Packet Alert(21) with length: 2
    (11:35:34) gnutls: lvl 9: ENC[0x1d70500]: cipher: AES-128-CBC, MAC: SHA1, Epoch: 1
    (11:35:34) gnutls: lvl 4: REC[0x1d70500]: Sent Packet[3] Alert(21) in epoch 1 and length: 53
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_record.c:1204
    (11:35:34) gnutls: lvl 2: ASSERT: gnutls_record.c:230
    (11:35:34) gnutls: lvl 4: REC[0x1d70500]: Start of epoch cleanup
    (11:35:34) gnutls: lvl 4: REC[0x1d70500]: End of epoch cleanup
    (11:35:34) gnutls: lvl 4: REC[0x1d70500]: Epoch #1 freed
    (11:35:34) GLib: g_hash_table_destroy: assertion `hash_table != NULL' failed
    (11:35:34) sipe: sipe_purple_dns_query_cancel_all: entered
    (11:35:34) sipe: sipe_purple_transport_close_all: entered
    (11:35:34) connection: Destroying connection 0x1c22290
    (11:35:34) sipe: transport_deferred_destroy: 0x1d06e30
    (11:35:34) sipe: transport_deferred_destroy: 0x195e4a0
    (11:35:34) sipe: transport_deferred_destroy: 0x19ce0d0
    (11:35:40) util: Writing file accounts.xml to directory /home/iksrazal/.purple
    (11:35:40) util: Writing file /home/iksrazal/.purple/accounts.xml
    </a>
    
     
  • Stefan Becker

    Stefan Becker - 2013-05-23

    Hmm, this is unusable due to the bad HTML interface. I would suggest to use a pastebin service for the log and just post the URL here.

    According to the log you didn't enter a password. You need to enter your Office365 account name as login (if different from your user name) and the Office365 account password as password.

     
  • Stefan Becker

    Stefan Becker - 2013-05-23

    BTW: if you upgraded this account from a pre-1.15.x setup then please be sure to read the FAQ

     
  • robert lazarski

    robert lazarski - 2013-05-28

    Thanks for the reply. I did read the FAQ as suggested but didn't see my specific issue.

    I put the logs here:

    http://braziloutsource.com/random/sipe.txt

    From the logs, I believe the null password you refer to is this:

    <wsse:Password></wsse:Password>
    

    However, in the Pidgin/Sipe UI, and in my "$HOME/.purple/accounts.xml" I see my password:

    <protocol>prpl-sipe</protocol><name>rlazarski@mycompany.com,rlazarski@mycompany.com</name><password>mypassword</password><alias>rlazarski</alias>
    

    And settings:

    <settings><setting name='sso' type='bool'>1</setting>                                                        <setting name='krb5' type='bool'>0</setting>                                                        <setting name='transport' type='string'>tls</setting>                                                    
    <setting name='server' type='string'>sipdir.online.lync.com:443</setting>                             
    <setting name='useragent' type='string'>CCAPI/4.0.7577.0 OC/4.0.7577.0</setting>                                                        
    </settings>
    

    Any idea why the password is being sent blank?

     
  • robert lazarski

    robert lazarski - 2013-05-28

    Oops, that settings was from the wrong machine, the rest of the info is correct:

    <settings>
                            <setting name='authentication' type='string'>tls-dsk</setting>
                            <setting name='sso' type='bool'>1</setting>
                            <setting name='transport' type='string'>auto</setting>
                            <setting name='useragent' type='string'>UCCAPI/4.0.7577.314 OC/4.0.7577.314 (Microsoft Lync 2010)</setting>
                            <setting name='silence-suppression' type='bool'>0</setting>
                            <setting name='server' type='string'>sipdir.online.lync.com:443</setting>
                            <setting name='dont-publish' type='bool'>1</setting>
                    </settings>
    
     
    Last edit: robert lazarski 2013-05-28
    • Stefan Becker

      Stefan Becker - 2013-05-28

      As I wrote already: read the FAQ when you upgrade an account from a pre-1.15.0 installation.

       
  • robert lazarski

    robert lazarski - 2013-05-28

    double post

     
    Last edit: robert lazarski 2013-05-28
  • robert lazarski

    robert lazarski - 2013-07-23

    I finally got a new opensuse 12.3 x64 install with sipe-1.16 and pidgin-2.10.7 from the repos. No previous installs on this machine. I'm still getting the same exact issue AFAIK, the wsse:Password element is empty.

    See links for logs and screenshots. Please help.

    Logs:

    http://www.braziloutsource.com/random/sipe_problems_jul23.txt

    Screenshots:

    http://www.braziloutsource.com/random/sipe_snapshot1.png

    http://www.braziloutsource.com/random/sipe_snapshot2.png

     
    • Stefan Becker

      Stefan Becker - 2013-07-26

      Login: can be left empty as it is the same as your user name.

      Server[:Port] should be left empty unless auto-discovery fails. As you seem to use an Office 365 installation auto-discovery should work, because it is handled by M$ services.

      TLS-DSK doesn't support Single-Sign On, you must remove the checkmark.

       
  • KwikSilvr

    KwikSilvr - 2013-07-23

    Uncheck the box for single sign on

     
  • robert lazarski

    robert lazarski - 2013-07-23

    Well that did work to a limited extent!

    I tested a chat ok with someone but their status is offline. They can see me online in their non-pidgin clients but I can't see them online, ie I don't see anyone with a green online status though they are indeed online,

     
    Last edit: robert lazarski 2013-07-23
  • robert lazarski

    robert lazarski - 2013-07-23

    This seems like an FAQ issue but its supposed to fixed now, any ideas?

    "UPDATE version 1.16.1: The buddy list is now correctly processed, i.e. they are no longer shown as offline. Modifying the buddy list does not work yet, though."

     
  • KwikSilvr

    KwikSilvr - 2013-07-24

    I havent had to deal with Lync 2013 yet, but an updated logs showing the issue wouldnt hurt.

     

Log in to post a comment.

Get latest updates about Open Source Projects, Conferences and News.

Sign up for the SourceForge newsletter:

JavaScript is required for this form.





No, thanks