IBM Support

PK76360: SERVER'S SECURITY SETTING 'CSIV2 INBOUND TRANSPORT' SET TO "SSL-REQUIRED" RESULTS IN CORBA::UNKNOWN EXCEPTION

Fixes are available

7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for IBM i
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for AIX
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for HP-UX
7.0.0.3: Java SDK 1.6 SR4 Cumulative Fix for WebSphere Application Server
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for Solaris
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for Linux
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for AIX
7.0.0.3: WebSphere Application Server V7.0 Fix Pack 3 for Windows
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for IBM i
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for Windows
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for HP-UX
7.0.0.5: Java SDK 1.6 SR5 Cumulative Fix for WebSphere Application Server
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for Solaris
7.0.0.5: WebSphere Application Server V7.0 Fix Pack 5 for Linux
Java SDK 1.5 SR10 Cumulative Fix for WebSphere Application Server
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for IBM i
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for AIX
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for Windows
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for HP-UX
7.0.0.7: Java SDK 1.6 SR6 Cumulative Fix for WebSphere Application Server
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for Solaris
7.0.0.7: WebSphere Application Server V7.0 Fix Pack 7 for Linux
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for IBM i
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Windows
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for AIX
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for HP-UX
7.0.0.9: Java SDK 1.6 SR7 Cumulative Fix for WebSphere Application Server
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Solaris
7.0.0.9: WebSphere Application Server V7.0 Fix Pack 9 for Linux
6.1.0.31: Java SDK 1.5 SR11 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for IBM i
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windows
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UX
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIX
7.0.0.11: Java SDK 1.6 SR7 Cumulative Fix for WebSphere Application Server
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Solaris
7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Linux
6.1.0.33: Java SDK 1.5 SR12 FP1 Cumulative Fix for WebSphere
6.1.0.29: Java SDK 1.5 SR11 Cumulative Fix for WebSphere Application Server
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for AIX
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for HP-UX
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for IBM i
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Linux
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Solaris
7.0.0.13: WebSphere Application Server V7.0 Fix Pack 13 for Windows
7.0.0.13: Java SDK 1.6 SR8FP1 Cumulative Fix for WebSphere Application Server
6.1.0.35: Java SDK 1.5 SR12 FP2 Cumulative Fix for WebSphere
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for AIX
7.0.0.15: Java SDK 1.6 SR9 Cumulative Fix for WebSphere Application Server
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for HP-UX
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for IBM i
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Linux
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Solaris
7.0.0.15: WebSphere Application Server V7.0 Fix Pack 15 for Windows
6.1.0.37: Java SDK 1.5 SR12 FP3 Cumulative Fix for WebSphere
7.0.0.17: WebSphere Application Server V7.0 Fix Pack 17
7.0.0.17: Java SDK 1.6 SR9 FP1 Cumulative Fix for WebSphere Application Server
6.1.0.39: Java SDK 1.5 SR12 FP4 Cumulative Fix for WebSphere Application Server
7.0.0.19: WebSphere Application Server V7.0 Fix Pack 19
6.1.0.41: Java SDK 1.5 SR12 FP5 Cumulative Fix for WebSphere Application Server
7.0.0.21: WebSphere Application Server V7.0 Fix Pack 21
6.1.0.43: Java SDK 1.5 SR13 Cumulative Fix for WebSphere Application Server
7.0.0.23: WebSphere Application Server V7.0 Fix Pack 23
7.0.0.25: WebSphere Application Server V7.0 Fix Pack 25
6.1.0.45: Java SDK 1.5 SR14 Cumulative Fix for WebSphere Application Server
7.0.0.27: WebSphere Application Server V7.0 Fix Pack 27
7.0.0.29: WebSphere Application Server V7.0 Fix Pack 29
6.1.0.47: WebSphere Application Server V6.1 Fix Pack 47
7.0.0.31: WebSphere Application Server V7.0 Fix Pack 31
7.0.0.27: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.33: WebSphere Application Server V7.0 Fix Pack 33
7.0.0.35: WebSphere Application Server V7.0 Fix Pack 35
6.1.0.47: Java SDK 1.5 SR16 Cumulative Fix for WebSphere Application Server
7.0.0.19: Java SDK 1.6 SR9 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.21: Java SDK 1.6 SR9 FP2 Cumulative Fix for WebSphere
7.0.0.23: Java SDK 1.6 SR10 FP1 Cumulative Fix for WebSphere
7.0.0.25: Java SDK 1.6 SR11 Cumulative Fix for WebSphere Application Server
7.0.0.27: Java SDK 1.6 SR12 Cumulative Fix for WebSphere Application Server
7.0.0.29: Java SDK 1.6 SR13 FP2 Cumulative Fix for WebSphere Application Server
7.0.0.45: Java SDK 1.6 SR16 FP60 Cumulative Fix for WebSphere Application Server
7.0.0.31: Java SDK 1.6 SR15 Cumulative Fix for WebSphere Application Server
7.0.0.35: Java SDK 1.6 SR16 FP1 Cumulative Fix for WebSphere Application Server
7.0.0.37: Java SDK 1.6 SR16 FP3 Cumulative Fix for WebSphere Application Server
7.0.0.39: Java SDK 1.6 SR16 FP7 Cumulative Fix for WebSphere Application Server
7.0.0.41: Java SDK 1.6 SR16 FP20 Cumulative Fix for WebSphere Application Server
7.0.0.43: Java SDK 1.6 SR16 FP41 Cumulative Fix for WebSphere Application Server
Obtain the fix for this APAR.

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • During interoperability testing with enterprise bean lookup
    from WebSphere Application Server v6.1 to WebSphere
    Application Server v6.1, having 'CSIv2 inbound transport' set
    to "SSL-required", the IIOP port is being set to 0 in the
    calling server.
    
    Joblog (JESYSMSG) shows SSL-required set:
    BBOM0001I com_ibm_CSI_claimTransportAssocSSLTLSRequired: 1.
    BBOM0001I com_ibm_CSI_claimTransportAssocSSLTLSSupported: 0.
    
    The IIOP URL of
    "corbaloc:iiop:1.2@<server_group.net>:0/NameServiceServerRoot",
    with port=0.  The Naming code then attempts to resolve this URL
    and fails because the port is 0.
    
    This results in CORBA::UNKNOWN exception.
    
    ===== Sample test case analysis ======
    In the Servant Region, the last printout by the application
    shows:
    WAS Initial Context created now looking up
    cell/clusters/<cluster_name>/ejb/InteropEJBHome
    
    Then the exception gets thrown in the Servant Region:
    Trace: 2008/11/11 13:53:51.408 01 t=9B8870 c=UNK key=P8
    (13007002)
    ThreadId: 00000021
    FunctionName: com.ibm.ws.naming.util.Helpers
    SourceId: com.ibm.ws.naming.util.Helpers
    Category: WARNING
    ExtendedMessage: BBOO0221W: NMSV0610I: A NamingException is
    being thrown from a javax.naming.Context implementation. Details
    follow
    
    Backtracking in the Control Region from 13:53:51.408, can see
    the error is with the thread that processed the exception:
    Trace: 2008/11/11 13:53:50.629 01 t=9B5AD0 c=UNK key=S2
    (0404800A)
    Description: ORBEJSBridge - sending back System Exception
    Method Name: ORBEJSBridge::invoke(void *)
    Rep Id: IDL:omg.org/CORBA/UNKNOWN:1.0
    Class Name: CORBA::UNKNOWN
    Minor Code: -910010465
    Completion Status: 1
    

Local fix

  • The server side's security setting for CSIv2 inbound transport
    should be set to SSL-supported instead of SSL-required:
    
    From Admin Console, navigate to:
    1. Click Security > Secure administration, applications, and
    infrastructure.
    2. Under Authentication, click RMI/IIOP security > CSIv2 inbound
    transport
    3. Set Transport to SSL-Supported
    
    Please remember to Save / Synchronize and recycle the server.
    
    -----------------------------------------------------------
    
    Changing just this CSIv2 inbound transport may generate
    a different error -  CORBA.NO_PERMISSION.
    To fix this, change the RMI/IIOP outbound CSIv2 Outbound
    Authentication settings (either at this cell level, or
    over-ride for this server) to
    Client certificate authentication set to Supported.
    .
    * If you are doing this at a cell level:
    Admin Console > Security > Secure administration,
    applications, and infrastructure > RMI/IIOP security > CSIv2
    outbound authentication >
    Client certificate authentication set to Supported.
    .
    Please remember to Save / Synchronize and recycle the server.
    .
    * If you are doing this at a server level:
    Admin Console > Servers > Application servers > WFS001C > Server
    security >
    Enable: "RMI/IIOP security for this server overrides the cell
    settings "
    > CSIv2 outbound authentication > Client certificate
    authentication set to Supported
    .
    Please remember to Save / Synchronize and recycle the server.
    

Problem summary

  • ****************************************************************
    * USERS AFFECTED:  All users of WebSphere Application Server   *
    *                  V6.1.0 for z/OS                             *
    ****************************************************************
    * PROBLEM DESCRIPTION: Federated bindings created by the       *
    *                      name server to link to other servers    *
    *                      cannot resolve when running with SSL.   *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    The name server builds federated bindings in the name space
    which resolve to other servers.  This allows lookups on
    objects in servers other than the one which the JNDI client is
    bootstrapped to.  These bindings are created with URLs
    starting with corbaloc:dyn:.  Those URLs cannot be resolve
    when the system is configured to use SSL.  To fix the problem,
    we switched to corbaloc:iiop: URLs, same as those used on
    distributed platforms.  With out the fix, names of the form
    cell/nodes/<node name>/servers/<server name>/<rest of name> or
    cell/clusters/<cluster name>/<rest of name> do not resolve
    successfully.  DumpNameSpace output includes the federated
    binding URLs.
    

Problem conclusion

  • The name server now uses corbaloc:iiop: URLs instead of
    corbaloc:dyn: URLs.  URLs of this form work in all situations.
    
    APAR PK76360 is currently targeted for inclusion in
    Service Level (Fix Pack) 6.1.0.25 of WebSphere
    Application Server V6.1 for z/OS.
    
    Please refer to URL:
    //www.ibm.com/support/docview.wss?rs=404&uid=swg27006970
    for Fix Pack availability.
    

Temporary fix

Comments

APAR Information

  • APAR number

    PK76360

  • Reported component name

    WEBSPHERE FOR Z

  • Reported component ID

    5655I3500

  • Reported release

    610

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt

  • Submitted date

    2008-11-24

  • Closed date

    2009-01-22

  • Last modified date

    2009-07-01

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

    PK82693

Fix information

  • Fixed component name

    WEBSPHERE FOR Z

  • Fixed component ID

    5655I3500

Applicable component levels

  • R610 PSY UK47214

       UP09/06/22 P F906

Fix is available

  • Select the PTF appropriate for your component level. You will be required to sign in. Distribution on physical media is not available in all countries.

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS7K4U","label":"WebSphere Application Server for z\/OS"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"6.1","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
29 December 2021