After I installed Java 8 on my main notebook, I had the need to get on an ILOM for an ODA rebuild in the lab, and boy was I surprised with this error!
So, after a little research on the error, I figured out that the ILOM uses SSLv3. On that note, Wireshark is a great FREE sniffer. You can grab a copy from here. https://www.wireshark.org/
What I saw here, is the ACK not being sent from my system. But the packets were being received. So I dug around a little and discovered that in JDK 8u31, JDK 7u75 and JDK 6u91 SSLv3 is disabled by default to address the SSL V3.0 Poodle Vulnerability. Details on that are here; http://www.oracle.com/technetwork/topics/security/poodlecve-2014-3566-2339408.html
Being it was a weekend, my quick fix is to enable SSLV3 on the Java Client. To do this, locate the java.security file ( On windows look in c:\Program Files (x86)/Java/jre1.8.0_45/lib/security or something similar ) and comment out the line;
So, it should now look something like this;
# See the specification of "jdk.certpath.disabledAlgorithms" for the
# syntax of the disabled algorithm string.
# Note: This property is currently used by Oracle's JSSE implementation.
# It is not guaranteed to be examined and used by other implementations.
# jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
While, this is not the perfect fix, it will get you through an install.
Now I can get back to the ODA rebuild!