IBM Support

PI40252: SLADMIN QUERY SESSIONS OUTPUT CONTAINS CORRUPT DATA

A fix is available

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • The results produced for an SSLADMIN QUERY SESSIONS command can,
    at times, contain corrupt information, as show below:
    ...
    DTCSSL2404I Sending command to server(s): TCPIP
    DTCSSL2430I Session information:
    
    Server   Local Socket    Remote Socket   Type Label CiperDetails
    -------- --------------- --------------- ---- ----- ------------
    SSL00001 <ip_addr..port> <ip_addr..port> I    12.34.I56.78..1234
    ...
    Here, the data provided for the 'Label' and 'Cipher Details'
    fields contains corrupted data '12.34.I56.78..1234', instead of
    expected values for a particular conection.
    
    This problem has been seen to occur when the connections
    associated with an implicit SSL session are not fully closed,
    where one of the connections remains in a FIN-wait-2 state.
    

Local fix

  • N/A
    

Problem summary

  • ****************************************************************
    * USERS AFFECTED: ALL USERS OF THE Z/VM TCP/IP SSLADMIN        *
    *                 COMMAND                                      *
    ****************************************************************
    * PROBLEM DESCRIPTION:                                         *
    ****************************************************************
    * RECOMMENDATION: APPLY PTF                                    *
    ****************************************************************
    In the event that a connection maintained by the SSL server is
    no longer known to the TCPIP stack, it causes a miss-match in
    the "NETSTAT IDENTIFY SSL" records. The "SSLADMIN QUERY
    SESSIONS" command will reference the miss-matched records and
    output corrupt fields.
    

Problem conclusion

  • The code has been updated to correctly display all fields for
    the SSLADMIN QUERY SESSIONS command.
    

Temporary fix

Comments

APAR Information

  • APAR number

    PI40252

  • Reported component name

    TCP/IP V2 FOR V

  • Reported component ID

    5735FAL00

  • Reported release

    540

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2015-05-01

  • Closed date

    2016-09-14

  • Last modified date

    2016-12-02

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

    UI41986

Modules/Macros

  • SSLADMIN
    

Fix information

  • Fixed component name

    TCP/IP V2 FOR V

  • Fixed component ID

    5735FAL00

Applicable component levels

  • R540 PSY UI42771

       UP16/12/02 I 1000

Fix is available

  • Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.

[{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SG27N","label":"APARs - VM\/ESA environment"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"540","Edition":"","Line of Business":{"code":"","label":""}},{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"SG27M","label":"APARs - z\/VM environment"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"540","Edition":"","Line of Business":{"code":"LOB16","label":"Mainframe HW"}}]

Document Information

Modified date:
02 December 2016