Troubleshooting
Problem
As of z/OS 3.2, an LDAP client attempting to connect using a secure connection ( SSL/TLS ) can fail with RC=116 "ldap_sasl_bind: SSL handshake with the server failed".
Symptom
The connection between the client and server is terminated with RC=116 "ldap_sasl_bind: SSL handshake with the server failed".
Cause
z/OS System SSL now defaults the SSL cipher suites format to 4-character ciphers, however the LDAP client defaults to 2-character ciphers.
Environment
A z/OS 3.2 system running the z/OS LDAP client utilities that does not specify the LDAP_SSL_CIPHER_FORMAT environment variable to CHAR4.
Diagnosing The Problem
Collect a z/OS LDAP debug trace using the -d parameter in the ldapsearch utility. If the LDAP client is defaulting to 2-byte ciphers then the LDAP_SSL_CIPHER_FORMAT environment variable is not defined to CHAR4.
TRACE ldap_ssl_get_cipher_format()1946: LDAP_SSL_CIPHER_FORMAT envvar is not set. The default 2-byte ciphers format will be assumed.
TRACE ldap_ssl_get_cipher_format()1951: <= ciphers format retrieved = 2
TRACE ldap_ssl_socket_init()1729: <= rc=116 ldap_sasl_bind: SSL handshake with the server failed
Resolving The Problem
To resolve this issue , specify the LDAP_SSL_CIPHER_FORMAT environment variable to use the 4 character cipher format.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
24 February 2026
UID
ibm17260683