AMPX036I ASSERTION CLOSING IMPLICIT SSL TELNET CONNECTION


 
 APAR Identifier ...... PK81448      Last Changed ........ 09/06/19
 AMPX036I ASSERTION CLOSING IMPLICIT SSL TELNET CONNECTION
 
 Symptom ...... IN INCORROUT         Status ........... CLOSED  PER
 Severity ................... 3      Date Closed ......... 09/03/30
 Component .......... 5735FAL00      Duplicate of ........
 Reported Release ......... 540      Fixed Release ............ 999
 Component Name TCP/IP V2 FOR V      Special Notice
 Current Target Date ..              Flags
 SCP ...................
 Platform ............
 
 Status Detail: SHIPMENT - Packaged solution is available for
                           shipment.
 
 PE PTF List:
 
 PTF List:
 Release 540   : UK45373 available 09/06/19 (0902 )
 
 Parent APAR:
 Child APAR list:
 
 ERROR DESCRIPTION:
 When one closes a Host on Demand implicit (static) secure
 Telnet connection, the Pascal assertion message that
 follows is reported by the TCP/IP stack server:
 
  AMPX036I ASSERTION FAILURE CHECKING ERROR
        TRACE BACK OF CALLED ROUTINES
   ROUTINE                STMT AT ADDRESS IN MODULE
   SSKNOTICE                50    00DE1F70   SOCKREQ
   FindAndS                 88    00E14572
   Notify                  168    00E147C6
   Schedule               2082    00CDF45C
   <MAIN-PROGRAM>           14    00C1F1FE   TCPIP
   VSPASCAL                       00E48582
 
 This message has no adverse affect on TCP/IP stack or SSL server
 operations for the subject or subsequent connections.
 
 LOCAL FIX:
 None.
 
 PROBLEM SUMMARY:
 ****************************************************************
 * USERS AFFECTED: ALL USERS OF Z/VM SSL SERVER.                *
 ****************************************************************
 * PROBLEM DESCRIPTION:                                         *
 ****************************************************************
 * RECOMMENDATION: APPLY PTF                                    *
 ****************************************************************
 When a client disconnects an implicitly (static) secure
 connection, if the client generates a close-notify alert,
 the SSL server passes a notification to the TCP/IP
 stack server.  The TCP/IP stack server displays the
 AMPX036I assertion message because it does not expect this
 notification on a connection that is secured statically.
 
 PROBLEM CONCLUSION:
 In SSLVMAIN.C when a worker thread is handling a connection,
 if a close-notify alert is received from the connection partner,
 the worker thread always informed the TCP/IP stack server
 that we received a close-notify alert by calling doHSioctl().
 This APAR changes the worker thread logic so that doHSioctl()
 is only called for explicitly secured (dynamic) connections.
 For implicitly secured (static) connections, a worker thread
 will now cause the TCP connection to be ended.
 
 TEMPORARY FIX:
 
 COMMENTS:
 
 MODULES/MACROS:   SSLSERV  SSLVMAIN
 
 SRLS:      NONE
 
 RTN CODES:
 
 CIRCUMVENTION:
 
 MESSAGE TO SUBMITTER: