AMPX036I ASSERTION CLOSING IMPLICIT SSL TELNET CONNECTION
APAR Identifier ...... PK81448 Last Changed ........ 09/06/19 AMPX036I ASSERTION CLOSING IMPLICIT SSL TELNET CONNECTION Symptom ...... IN INCORROUT Status ........... CLOSED PER Severity ................... 3 Date Closed ......... 09/03/30 Component .......... 5735FAL00 Duplicate of ........ Reported Release ......... 540 Fixed Release ............ 999 Component Name TCP/IP V2 FOR V Special Notice Current Target Date .. Flags SCP ................... Platform ............ Status Detail: SHIPMENT - Packaged solution is available for shipment. PE PTF List: PTF List: Release 540 : UK45373 available 09/06/19 (0902 ) Parent APAR: Child APAR list: ERROR DESCRIPTION: When one closes a Host on Demand implicit (static) secure Telnet connection, the Pascal assertion message that follows is reported by the TCP/IP stack server: AMPX036I ASSERTION FAILURE CHECKING ERROR TRACE BACK OF CALLED ROUTINES ROUTINE STMT AT ADDRESS IN MODULE SSKNOTICE 50 00DE1F70 SOCKREQ FindAndS 88 00E14572 Notify 168 00E147C6 Schedule 2082 00CDF45C <MAIN-PROGRAM> 14 00C1F1FE TCPIP VSPASCAL 00E48582 This message has no adverse affect on TCP/IP stack or SSL server operations for the subject or subsequent connections. LOCAL FIX: None. PROBLEM SUMMARY: **************************************************************** * USERS AFFECTED: ALL USERS OF Z/VM SSL SERVER. * **************************************************************** * PROBLEM DESCRIPTION: * **************************************************************** * RECOMMENDATION: APPLY PTF * **************************************************************** When a client disconnects an implicitly (static) secure connection, if the client generates a close-notify alert, the SSL server passes a notification to the TCP/IP stack server. The TCP/IP stack server displays the AMPX036I assertion message because it does not expect this notification on a connection that is secured statically. PROBLEM CONCLUSION: In SSLVMAIN.C when a worker thread is handling a connection, if a close-notify alert is received from the connection partner, the worker thread always informed the TCP/IP stack server that we received a close-notify alert by calling doHSioctl(). This APAR changes the worker thread logic so that doHSioctl() is only called for explicitly secured (dynamic) connections. For implicitly secured (static) connections, a worker thread will now cause the TCP connection to be ended. TEMPORARY FIX: COMMENTS: MODULES/MACROS: SSLSERV SSLVMAIN SRLS: NONE RTN CODES: CIRCUMVENTION: MESSAGE TO SUBMITTER: