About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
AMPX036I ASSERTION CLOSING IMPLICIT SSL TELNET CONNECTION
APAR Identifier ...... PK81448 Last Changed ........ 09/06/19 AMPX036I ASSERTION CLOSING IMPLICIT SSL TELNET CONNECTION Symptom ...... IN INCORROUT Status ........... CLOSED PER Severity ................... 3 Date Closed ......... 09/03/30 Component .......... 5735FAL00 Duplicate of ........ Reported Release ......... 540 Fixed Release ............ 999 Component Name TCP/IP V2 FOR V Special Notice Current Target Date .. Flags SCP ................... Platform ............ Status Detail: SHIPMENT - Packaged solution is available for shipment. PE PTF List: PTF List: Release 540 : UK45373 available 09/06/19 (0902 ) Parent APAR: Child APAR list: ERROR DESCRIPTION: When one closes a Host on Demand implicit (static) secure Telnet connection, the Pascal assertion message that follows is reported by the TCP/IP stack server: AMPX036I ASSERTION FAILURE CHECKING ERROR TRACE BACK OF CALLED ROUTINES ROUTINE STMT AT ADDRESS IN MODULE SSKNOTICE 50 00DE1F70 SOCKREQ FindAndS 88 00E14572 Notify 168 00E147C6 Schedule 2082 00CDF45C <MAIN-PROGRAM> 14 00C1F1FE TCPIP VSPASCAL 00E48582 This message has no adverse affect on TCP/IP stack or SSL server operations for the subject or subsequent connections. LOCAL FIX: None. PROBLEM SUMMARY: **************************************************************** * USERS AFFECTED: ALL USERS OF Z/VM SSL SERVER. * **************************************************************** * PROBLEM DESCRIPTION: * **************************************************************** * RECOMMENDATION: APPLY PTF * **************************************************************** When a client disconnects an implicitly (static) secure connection, if the client generates a close-notify alert, the SSL server passes a notification to the TCP/IP stack server. The TCP/IP stack server displays the AMPX036I assertion message because it does not expect this notification on a connection that is secured statically. PROBLEM CONCLUSION: In SSLVMAIN.C when a worker thread is handling a connection, if a close-notify alert is received from the connection partner, the worker thread always informed the TCP/IP stack server that we received a close-notify alert by calling doHSioctl(). This APAR changes the worker thread logic so that doHSioctl() is only called for explicitly secured (dynamic) connections. For implicitly secured (static) connections, a worker thread will now cause the TCP connection to be ended. TEMPORARY FIX: COMMENTS: MODULES/MACROS: SSLSERV SSLVMAIN SRLS: NONE RTN CODES: CIRCUMVENTION: MESSAGE TO SUBMITTER: