IC92177: PCOM: SSL SESSION DROPS ON AT-TLS CIPHER REFRESH
Closed as suggestion for future release.
When using PComm and IBM GSKit security package with the AT-TLS Cipher refresh feature enabled the session is dropped at the timer interval set for Cipher refresh.
When IBM Personal Communications is used to connect over a secure connection to a host configured with Cipher renegotiation, sessions may be disconnected during the Cipher renegotiation sequence. This occurs with both IBM Global Security Kit (GSKit) and Microsoft CryptoAPI (MSCAPI) connections. Towards the end of Cipher renegotiation, the receiving thread of PCOM session returns from the select() call indicating availability of data over the listening socket. A subsequent call to recv() fails as there is no data available on the socket and PCOM terminates the connection. The sequence of TCP/IP calls made by PCOM is correct and as designed. The root cause of the problem is the unexpected failure from recv() API. To handle this Cipher renegotiation failure requires a design change in the telnet component of IBM Personal Communications. This APAR is being closed as a Suggestion to the PCOM development team.
Reported component name
PCOMM V5 COMBO-
Reported component ID
Last modified date
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Applicable component levels
Translate this page: