Fixes are available
Java SDK 1.5 SR8 Cumulative Fix for WebSphere Application Server
Java SDK 1.5 SR8 Cumulative Fix for WebSphere Application Server
Java SDK 1.5 SR10 Cumulative Fix for WebSphere Application Server
6.1.0.31: Java SDK 1.5 SR11 FP1 Cumulative Fix for WebSphere Application Server
6.1.0.33: Java SDK 1.5 SR12 FP1 Cumulative Fix for WebSphere
6.1.0.29: Java SDK 1.5 SR11 Cumulative Fix for WebSphere Application Server
6.1.0.35: Java SDK 1.5 SR12 FP2 Cumulative Fix for WebSphere
6.1.0.37: Java SDK 1.5 SR12 FP3 Cumulative Fix for WebSphere
6.1.0.39: Java SDK 1.5 SR12 FP4 Cumulative Fix for WebSphere Application Server
6.1.0.41: Java SDK 1.5 SR12 FP5 Cumulative Fix for WebSphere Application Server
6.1.0.43: Java SDK 1.5 SR13 Cumulative Fix for WebSphere Application Server
6.1.0.45: Java SDK 1.5 SR14 Cumulative Fix for WebSphere Application Server
6.1.0.47: WebSphere Application Server V6.1 Fix Pack 47
6.1.0.47: Java SDK 1.5 SR16 Cumulative Fix for WebSphere Application Server
Obtain the fix for this APAR.
APAR status
Closed as program error.
Error description
Under certain conditions, the SSL channel will leak a socket file descriptor. The FFDC will record an entry id 507 from the SSLQueuedHandshake class. Stack Dump=javax.net.ssl.SSLException: Handshake terminated SSL engine: CLOSED at com.ibm.ssl.channel.impl. SSLUtils.handleHandshake(SSLUtils.java:808) at com.ibm.ssl.channel.impl. SSLQueuedHandshake.run(SSLQueuedHandshake.java:81)
Local fix
Problem summary
**************************************************************** * USERS AFFECTED: All users of WebSphere Application Server * * V6.1 for z/OS using SSL channel. * **************************************************************** * PROBLEM DESCRIPTION: Under certain conditions, the SSL hand * * shake will fail and leak a socket. FFDC * * shows the SSLQueuedHandshake class * * recording a "handshake terminated" * * exception. * **************************************************************** * RECOMMENDATION: * **************************************************************** In the control region, the SSL handshake work will attempt to complete on non-ACRW threads. If this queued handshake event receives an SSL handshake failure, then it is possible for the queued handshake class to mishandle the error and not properly close the socket at that point.
Problem conclusion
The queued handshake class will now properly notify the SSL channel code of the handshake failure in this condition. The handshake failure is then handled gracefully, according to the individual scenario. The initial handshake of a socket will result in the socket closure, while a renegotiation midstream will hand the read or write IO failure back to the channel user such as HTTP channel, or DCS channel, etc. APAR PK52674 is currently targeted for inclusion in Service Level (Fix Pack) 6.1.0.13 of WebSphere Application Server V6.1 for z/OS.
Temporary fix
Comments
APAR Information
APAR number
PK52674
Reported component name
WEBSPHERE FOR Z
Reported component ID
5655I3500
Reported release
610
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt
Submitted date
2007-09-11
Closed date
2007-10-20
Last modified date
2007-12-03
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
WEBSPHERE FOR Z
Fixed component ID
5655I3500
Applicable component levels
R500 PSN
UP
R601 PSN
UP
R610 PSY UK31212
UP07/11/22 P F711
Fix is available
Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.
Document Information
Modified date:
29 December 2021