Here is the Java Console output and x11vnc output when connecting directly to SSL x11vnc.

There is no Web proxy.

The URL used in the Java enabled Web browser is: "https://mymachine.net"

Port 443 on mymachine.net was redirected to the x11vnc VNC server (on port 5905).

The VNC server was run via the command:

   x11vnc -display :0 -ssl SAVE -httpdir /home/jimmy/x11vnc-0.9.8/classes/ssl -httpsredir -rfbport 5905 -forever -passwd mypass

The Web browser user promptly answered "Yes" to all of the popup dialogs.


Java Console output:
Java Plug-in 1.6.0_06
Using JRE version 1.6.0_06 Java HotSpot(TM) Client VM
User home directory = /Users/jimmy


----------------------------------------------------
c:   clear console window
f:   finalize objects on finalization queue
g:   garbage collect
h:   display this help message
l:   dump classloader list
m:   print memory usage
o:   trigger logging
p:   reload proxy configuration
q:   hide console
r:   reload policy configuration
s:   dump system and deployment properties
t:   dump thread list
v:   dump thread stack
x:   clear classloader cache
0-5: set trace level to 
----------------------------------------------------

urlPrefix: ''
SecurityManager restricts session recording.
Initializing...
Connecting to mymachine.net, port 443...
new SSLSocketToMe
SSL startup: mymachine.net 443
ustr is: https://mymachine.net:443/check.https.proxy.connection
set trusturlCerts to non-null
HttpURLConnection: Unexpected end of file from server
using trusturl_ctx
Using timeout of 6 secs to: mymachine.net:443
URL: trusturlCerts[0] matches certs[0]
Server Connection Verified on 1st try.
bcd START
Yes
done show()
bcd DONE
bcd: user said yes, accept it
SSL returning socket to caller.
Connected to server
done actionPerformed()
RFB server supports protocol version 3.8
Using RFB protocol version 3.7
Performing standard VNC authentication
VNC authentication succeeded
Desktop name is deepdish:0.0
Desktop size is 1152 x 864
Disconnect
RFB socket closed
RFB thread finished


Here is the corresponding x11vnc 0.9.8 output:
15/06/2009 21:29:31 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:31 SSL: spawning helper process to handle: 192.168.1.21:20602
15/06/2009 21:29:31 SSL: helper for peerport 20602 is pid 19922: 
15/06/2009 21:29:31 check_vnc_tls_mode: waited: 0.000011 / 1.40 input: SSL Handshake
15/06/2009 21:29:36 SSL: ssl_helper[19922]: SSL_accept() succeeded for: 192.168.1.21:20602
15/06/2009 21:29:36 SSL: ssl_helper[19922]: Cipher: TLSv1/SSLv3 AES256-SHA Proto: TLSv1
15/06/2009 21:29:36 SSL: ssl_helper[19922]: accepted client 192.168.1.21 x509 peer cert is null
15/06/2009 21:29:36 SSL: accept_openssl: cookie from ssl_helper[19922] FAILED. 62
15/06/2009 21:29:36 SSL: BUT WAIT! HTTPS for helper process[19922] succeeded. Good.
15/06/2009 21:29:37 httpd: get '' for 127.0.0.1
15/06/2009 21:29:37 httpd: defaulting to 'index.vnc'
15/06/2009 21:29:37 SSL: httpSock for helper[19922] went away
15/06/2009 21:29:37 SSL: guessing child helper[19922] https finished. dt=0.363171
15/06/2009 21:29:39 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:39 SSL: spawning helper process to handle: 192.168.1.21:20603
15/06/2009 21:29:39 SSL: helper for peerport 20603 is pid 19929: 
15/06/2009 21:29:39 check_vnc_tls_mode: waited: 0.058699 / 20.00 input: SSL Handshake
15/06/2009 21:29:44 SSL: ssl_helper[19929]: SSL_accept() succeeded for: 192.168.1.21:20603
15/06/2009 21:29:44 SSL: ssl_helper[19929]: Cipher: TLSv1/SSLv3 RC4-MD5 Proto: TLSv1
15/06/2009 21:29:44 SSL: ssl_helper[19929]: accepted client 192.168.1.21 x509 peer cert is null
15/06/2009 21:29:44 SSL: accept_openssl: cookie from ssl_helper[19929] FAILED. 56
15/06/2009 21:29:44 SSL: BUT WAIT! HTTPS for helper process[19929] succeeded. Good.
15/06/2009 21:29:45 httpd: get 'VncViewer.jar' for 127.0.0.1
15/06/2009 21:29:45 SSL: httpSock for helper[19929] went away
15/06/2009 21:29:45 SSL: guessing child helper[19929] https finished. dt=0.357826
15/06/2009 21:29:46 SSL: ssl_xfer[19929]: closing sockets 0, 12, 12
15/06/2009 21:29:46 SSL: ssl_helper[19929]: exit case 6 (https ssl_xfer done)
15/06/2009 21:29:47 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:47 SSL: spawning helper process to handle: 192.168.1.21:20605
15/06/2009 21:29:47 SSL: helper for peerport 20605 is pid 19943: 
15/06/2009 21:29:47 check_vnc_tls_mode: waited: 0.000011 / 20.00 input: SSL Handshake
15/06/2009 21:29:47 SSL: ssl_helper[19943]: SSL_accept() succeeded for: 192.168.1.21:20605
15/06/2009 21:29:47 SSL: ssl_helper[19943]: Cipher: TLSv1/SSLv3 RC4-MD5 Proto: TLSv1
15/06/2009 21:29:47 SSL: ssl_helper[19943]: accepted client 192.168.1.21 x509 peer cert is null
15/06/2009 21:29:47 SSL: accept_openssl: cookie from ssl_helper[19943] FAILED. 61
15/06/2009 21:29:47 SSL: BUT WAIT! HTTPS for helper process[19943] succeeded. Good.
15/06/2009 21:29:47 httpd: get 'VncViewer.jar' for 127.0.0.1
15/06/2009 21:29:47 SSL: httpSock for helper[19943] went away
15/06/2009 21:29:47 SSL: guessing child helper[19943] https finished. dt=0.352237
15/06/2009 21:29:48 SSL: ssl_xfer[19943]: closing sockets 0, 12, 12
15/06/2009 21:29:48 SSL: ssl_helper[19943]: exit case 6 (https ssl_xfer done)
15/06/2009 21:29:49 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:49 SSL: spawning helper process to handle: 192.168.1.21:20606
15/06/2009 21:29:49 SSL: helper for peerport 20606 is pid 19944: 
15/06/2009 21:29:49 check_vnc_tls_mode: waited: 0.000010 / 20.00 input: SSL Handshake
15/06/2009 21:29:49 SSL: ssl_helper[19944]: SSL_accept() succeeded for: 192.168.1.21:20606
15/06/2009 21:29:49 SSL: ssl_helper[19944]: Cipher: TLSv1/SSLv3 RC4-MD5 Proto: TLSv1
15/06/2009 21:29:49 SSL: ssl_helper[19944]: accepted client 192.168.1.21 x509 peer cert is null
15/06/2009 21:29:50 SSL: accept_openssl: cookie from ssl_helper[19944] FAILED. 59
15/06/2009 21:29:50 SSL: BUT WAIT! HTTPS for helper process[19944] succeeded. Good.
15/06/2009 21:29:50 httpd: get 'VncViewer.jar' for 127.0.0.1
15/06/2009 21:29:50 SSL: httpSock for helper[19944] went away
15/06/2009 21:29:50 SSL: guessing child helper[19944] https finished. dt=0.397384
15/06/2009 21:29:51 SSL: ssl_xfer[19944]: closing sockets 0, 12, 12
15/06/2009 21:29:51 SSL: ssl_helper[19944]: exit case 6 (https ssl_xfer done)
15/06/2009 21:29:53 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:53 SSL: spawning helper process to handle: 192.168.1.21:20609
15/06/2009 21:29:53 SSL: helper for peerport 20609 is pid 19974: 
15/06/2009 21:29:53 check_vnc_tls_mode: waited: 0.000011 / 20.00 input: SSL Handshake
15/06/2009 21:29:54 SSL: ssl_helper[19974]: SSL_accept() succeeded for: 192.168.1.21:20609
15/06/2009 21:29:54 SSL: ssl_helper[19974]: Cipher: TLSv1/SSLv3 RC4-MD5 Proto: TLSv1
15/06/2009 21:29:54 SSL: ssl_helper[19974]: accepted client 192.168.1.21 x509 peer cert is null
15/06/2009 21:29:54 Handling Check HTTPS request via https GET. [19974]
15/06/2009 21:29:54 -- GET /check.https.proxy.connection HTTP/1.1
Pragma: No-Cache
Proxy-Connection: Keep-Alive
Cache-Control: no-cache
User-Agent: Mozilla/4.0 (Linux 2.6.24-1-686) Java/1.6.0_06
Host: mymachine.net
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
Connection: keep-alive
Cookie:  


15/06/2009 21:29:54 SSL: ssl_helper[19974]: exit case 4 (check.https.proxy.connection)
15/06/2009 21:29:54 SSL: accept_openssl: cookie from ssl_helper[19974] FAILED. 60
15/06/2009 21:29:54 SSL: BUT WAIT! HTTPS for helper process[19974] succeeded. Good.
15/06/2009 21:29:54 SSL: guessing child helper[19974] https finished. dt=0.034989
15/06/2009 21:29:55 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:55 SSL: spawning helper process to handle: 192.168.1.21:20610
15/06/2009 21:29:55 SSL: helper for peerport 20610 is pid 19977: 
15/06/2009 21:29:55 check_vnc_tls_mode: waited: 0.000011 / 20.00 input: SSL Handshake
15/06/2009 21:29:55 SSL: ssl_helper[19977]: SSL_accept() *FATAL: -1 SSL FAILED
15/06/2009 21:29:55 SSL: error:1407609C:SSL routines:SSL23_GET_CLIENT_HELLO:http request
15/06/2009 21:29:55 SSL: ssl_helper[19977]: Proto: nosession
15/06/2009 21:29:55 SSL: ssl_helper[19977]: exit case 2 (ssl_init failed)
15/06/2009 21:29:55 SSL: accept_openssl: cookie from ssl_helper[19977] FAILED. 0
15/06/2009 21:29:56 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:56 SSL: spawning helper process to handle: 192.168.1.21:20611
15/06/2009 21:29:56 SSL: helper for peerport 20611 is pid 19978: 
15/06/2009 21:29:56 check_vnc_tls_mode: waited: 0.000011 / 20.00 input: SSL Handshake
15/06/2009 21:29:56 SSL: ssl_helper[19978]: SSL_accept() *FATAL: -1 SSL FAILED
15/06/2009 21:29:56 SSL: error:1407609C:SSL routines:SSL23_GET_CLIENT_HELLO:http request
15/06/2009 21:29:56 SSL: ssl_helper[19978]: Proto: nosession
15/06/2009 21:29:56 SSL: ssl_helper[19978]: exit case 2 (ssl_init failed)
15/06/2009 21:29:56 SSL: accept_openssl: cookie from ssl_helper[19978] FAILED. 0
15/06/2009 21:29:57 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:29:57 SSL: spawning helper process to handle: 192.168.1.21:20612
15/06/2009 21:29:57 SSL: helper for peerport 20612 is pid 19981: 
15/06/2009 21:29:57 check_vnc_tls_mode: waited: 0.057654 / 20.00 input: SSL Handshake
15/06/2009 21:29:57 SSL: ssl_helper[19981]: SSL_accept() succeeded for: 192.168.1.21:20612
15/06/2009 21:29:57 SSL: ssl_helper[19981]: Cipher: TLSv1/SSLv3 RC4-MD5 Proto: TLSv1
15/06/2009 21:29:57 SSL: ssl_helper[19981]: accepted client 192.168.1.21 x509 peer cert is null
15/06/2009 21:30:07 SSL: handshake with helper process[19981] succeeded.
15/06/2009 21:30:07   other clients:
15/06/2009 21:30:07      192.168.1.21
15/06/2009 21:30:07 incr accepted_client for 127.0.0.1:37493.
15/06/2009 21:30:07 Client Protocol Version 3.7
15/06/2009 21:30:07 Protocol version sent 3.7, using 3.7
15/06/2009 21:30:07 client progressed=1 in 1/2 0.125545 s
15/06/2009 21:30:07 rfbProcessClientSecurityType: executing handler for type 2
15/06/2009 21:30:11 client_set_net: 192.168.1.21  0.0004
15/06/2009 21:30:11 Using image quality level 6 for client 192.168.1.21
15/06/2009 21:30:11 Enabling X-style cursor updates for client 192.168.1.21
15/06/2009 21:30:11 Enabling full-color cursor updates for client 192.168.1.21
15/06/2009 21:30:11 Enabling cursor position updates for client 192.168.1.21
15/06/2009 21:30:11 Enabling LastRect protocol extension for client 192.168.1.21
15/06/2009 21:30:11 Enabling NewFBSize protocol extension for client 192.168.1.21
15/06/2009 21:30:11 Using tight encoding for client 192.168.1.21
15/06/2009 21:30:11 Pixel format for client 192.168.1.21:
15/06/2009 21:30:11   32 bpp, depth 24, little endian
15/06/2009 21:30:11   true colour: max r 255 g 255 b 255, shift r 16 g 8 b 0
15/06/2009 21:30:15 client 24 network rate 84.8 KB/sec (2483.6 eff KB/sec)
15/06/2009 21:30:15 client 24 latency:  318.0 ms
15/06/2009 21:30:15 dt1: 0.1342, dt2: 1.6287 dt3: 0.3180 bytes: 136068
15/06/2009 21:30:15 link_rate: LR_DIALUP - 318 ms, 80 KB/s
15/06/2009 21:30:20 SSL: ssl_xfer[19981]: closing sockets 0, 12, 12
15/06/2009 21:30:20 SSL: ssl_helper[19981]: exit case 7 (ssl_xfer done)
15/06/2009 21:30:20 client_count: 1
15/06/2009 21:30:20 sending SIGTERM to ssl_helper_pid: 19981
15/06/2009 21:30:20 connect_once: other shared clients still connected, not exiting.
15/06/2009 21:30:20 Client 192.168.1.21 gone
15/06/2009 21:30:20 Statistics             events    Transmit/ RawEquiv ( saved)
15/06/2009 21:30:20  FramebufferUpdate   :     10 |         0/        0 (  0.0%)
15/06/2009 21:30:20  LastRect            :      3 |        36/       36 (  0.0%)
15/06/2009 21:30:20  tight               :    135 |    141197/  4242908 ( 96.7%)
15/06/2009 21:30:20  PointerPos          :      1 |        12/       12 (  0.0%)
15/06/2009 21:30:20  RichCursor          :      1 |      1080/     1080 (  0.0%)
15/06/2009 21:30:20  TOTALS              :    150 |    142325/  4244036 ( 96.6%)
15/06/2009 21:30:20 Statistics             events    Received/ RawEquiv ( saved)
15/06/2009 21:30:20  PointerEvent        :     92 |       552/      552 (  0.0%)
15/06/2009 21:30:20  FramebufferUpdate   :     10 |       100/      100 (  0.0%)
15/06/2009 21:30:20  SetPixelFormat      :      1 |        20/       20 (  0.0%)
15/06/2009 21:30:20  SetEncodings        :      1 |        52/       52 (  0.0%)
15/06/2009 21:30:20  TOTALS              :    104 |       724/      724 (  0.0%)
15/06/2009 21:30:37 SSL: ssl_xfer[19922]: connection timedout. 1848  tv_use: 60
15/06/2009 21:30:37 SSL: ssl_xfer[19922]: closing sockets 0, 12, 12
15/06/2009 21:30:37 SSL: ssl_helper[19922]: exit case 6 (https ssl_xfer done)
15/06/2009 21:30:38 SSL: accept_openssl(OPENSSL_VNC)
15/06/2009 21:30:38 SSL: spawning helper process to handle: 192.168.1.21:20680
15/06/2009 21:30:38 SSL: helper for peerport 20680 is pid 20113: 
15/06/2009 21:30:38 check_vnc_tls_mode: waited: 0.000010 / 2.50 input: SSL Handshake
15/06/2009 21:30:38 SSL: ssl_helper[20113]: SSL_accept() succeeded for: 192.168.1.21:20680
15/06/2009 21:30:38 SSL: ssl_helper[20113]: Cipher: TLSv1/SSLv3 AES256-SHA Proto: TLSv1
15/06/2009 21:30:38 SSL: ssl_helper[20113]: accepted client 192.168.1.21 x509 peer cert is null
15/06/2009 21:30:38 SSL: accept_openssl: cookie from ssl_helper[20113] FAILED. 59
15/06/2009 21:30:38 SSL: BUT WAIT! HTTPS for helper process[20113] succeeded. Good.
15/06/2009 21:30:38 httpd: get 'favicon.ico' for 127.0.0.1
15/06/2009 21:30:38 httpProcessInput: open: No such file or directory
15/06/2009 21:30:38 SSL: httpSock for helper[20113] went away
15/06/2009 21:30:38 SSL: guessing child helper[20113] https finished. dt=0.338696
15/06/2009 21:31:38 SSL: ssl_xfer[20113]: connection timedout. 250  tv_use: 60
15/06/2009 21:31:38 SSL: ssl_xfer[20113]: closing sockets 0, 12, 12
15/06/2009 21:31:38 SSL: ssl_helper[20113]: exit case 6 (https ssl_xfer done)