Table of Contents

Search

  1. Preface
  2. Introduction to PowerExchange Utilities
  3. createdatamaps - Data Map Creation Utility
  4. DTLCCADW - Adabas PCAT Utility
  5. DTLCUIML - IMS Log Marker Utility
  6. DTLINFO - Release Information Utility
  7. DTLINFOX - Enhanced Release Information Utility
  8. DTLREXE - Remote Execution Utility
  9. DTLUAPPL - Restart Token Utility
  10. DTLUCBRG - Batch Registration Utility
  11. DTLUCDEP - CDEP Maintenance Utility
  12. DTLUCSR2 - IDMS SR2 and SR3 Records Utility
  13. DTLUCUDB - DB2 for Linux, UNIX, and Windows CDC Utility
  14. DTLULCAT and DTLULOGC - IDMS Log Catalog Utilities
  15. DTLURDMO - Data Map Utility
  16. DTLUTSK - Task Control Utility
  17. EDMLUCTR - Log Scan and Print Utility
  18. EDMUOPTS - Service Aid Utility
  19. EDMXLUTL - Event Marker Utility
  20. HOSTENT - TCP/IP Address Reporter Utility
  21. PWXCATMY - MySQL Catalog Utility
  22. PWXUCCLPRT - Print Log Summary Utility
  23. PWXUCDCT - Logger for Linux, UNIX, and Windows Utility
  24. PWXUCREG - Capture Registration Utility
  25. PWXUMAP - Map List Utility
  26. PWXUCRGP - Capture Registrations Print Utility
  27. PWXUDMX - Data Maps Update Time ECSA Memory Utility
  28. PWXUGSK - SSL Reporting Utility
  29. PWXUSSL - PowerExchange SSL Reporting Utility
  30. WRKJRNLCKE- Journal Lock Table Utility for IBM i

PING_SSLINFO=Y Report

PING_SSLINFO=Y Report

The PING report with SSL_INFO=Y provides secure connection attributes from the system that is being pinged.
To generate a PING report, enter the following command:
pwxussl cmd=ping ping_location=i5v7r4_SSL ping_uid=userabc ping_pwd=pass1 ping_sslinfo=y
The following output is an example of a PING report with SSL_INFO=Y specified:
PWX-37129 MONITOR statistics switched off for process PWXUSSL PWX-31008 TCPIP packet sizes for statement "NODE" name "abc1234_SSL" lowered from 262144 to 16384 for SSL connections. Processing console program. pwxussl cmd=ping ping_location=i5v7r4_SSL ping_uid=userabc PING_PWD=???? ping_sslinfo=y PING to location 'i5v7r4_SSL' ============================= rc = 0 from OS_Get_Module_EP() on SSLOPNWP rc = 0 from SSW_Init() rc=0 from SSW_Env_Open() Creating TCPIP socket connection to ipaddr 'i5v7r4' portno 50000 ---------------------------------------------------------------- rc=0 from WSAStartup() rc=0 from getaddrinfo() ipaddr=i5v7r4 portno=50000 socket number 500 returned from socket() rc=0 from connect() socket=500 Creating OpenSSL secure socket connection to ipaddr 'i5v7r4' portno 50000 ------------------------------------------------------------------------- rc=0 from SSW_Socket_Open() Secure socket created Sending the Connect request --------------------------- PacketSize 1344 = 2 * 96 (HDR) + 2 * 576 (LST_HDR_LEN) rc=0 from SSW_Send() Sent a Connect request. packet len=1344 WrittenLen=1344 10 messages from client-side SSLINFO SSLOPNWP INFORMATION BEFORE THE FIRST SEND Protocol='TLSv1.2' Cipher=X'C02F' (ECDHE-RSA-AES128-GCM-SHA256) State = 'SSLOK ' VerifyMode = 3 Options = X'03000004' (LEGACY_SERVER_CONNECT, NO_SSLv2, NO_SSLv3) Default Timeout = 7200 Session Timeout = 7200 Calling SSW_Receive() for 96 bytes rc=0 from SSW_Receive(). Received 96 bytes DTLREXE HDR. rc=0 rc1=0 rc2=0 datalen=96 ResultLen=0 Checking if the socket is readable ---------------------------------- Socket 500 is not readable as expected. The PowerExchange listener has accepted the connection. Sending the DTLREXEL PING request --------------------------------- PacketSize 120 = 96 (HDR) + 24 (Data length) rc=0 from SSW_Send() Sent a DTLREXEL request. packet len=120 WrittenLen=120 Receiving the Ping Result set HDR --------------------------------- Calling SSW_Receive() for 96 bytes rc=0 from SSW_Receive(). Received 96 bytes DTLREXE HDR. rc=0 rc1=0 rc2=0 datalen=1415 ResultLen=1319 Calling SSW_Receive() for 1319 bytes rc=0 from SSW_Receive(). Received 1319 bytes DTLREXEL result rc1=0 rc2=0 DTLREXEL result rc1=0 rc2=0 NbrMessages=23 length=1301 23 messages returned from DTLREXEL running under the listener ------------------------------------------------------------- 1: SSLGSKWP INFORMATION AFTER THE FIRST RECEIVE 2: Protocol='TLSV12' 3: HandshakeType='Full_Handshake' 4: SessionType='Server with Client Auth' 5: ClientAuthType='Client_auth_passthru' 6: ServerAuthType='Server_auth_passthru' 7: GSK_V3_SESSION_TIMEOUT=60 8: GSK_CONNECT_CIPHER_SPEC=00 9: GSK_CONNECT_SEC_TYPE=TLSV12 10: GSK_KEYRING_LABEL=INFAr4Cert 11: GSK_SID_VALUE=A5F4EC19A243000000000000000009FB 12: Local certificate: CERT_COMMON_NAME=INFAr4Cert 13: Local certificate: CERT_DN_PRINTABLE=CN=INFAr4Cert, OU=PowerExchange, O=Informatica, L=Maidenhead, ST=Berkshire, C=GB 14: Local certificate: CERT_ISSUER_COMMON_NAME=i5v7r4_CA 15: Local certificate: CERT_ISSUER_DN_PRINTABLE=CN=i5v7r4_CA, OU=PowerExchange, O=Informatica, L=Maidenhead, ST=Berkshire, C=GB 16: Local certificate: CERT_VALID_TO=20210812114936 17: Local certificate: CERT_VALID_TO_EX=11:49:36 12-08-2021 18: Partner certificate: CERT_COMMON_NAME=win64A 19: Partner certificate: CERT_DN_PRINTABLE=MAIL=example@informatica.com, CN=win64A, O=Informatica, L=Maidenhead, ST=Berkshire, C=GB 20: Partner certificate: CERT_ISSUER_COMMON_NAME=irrcerta.abc1234.informatica.com 21: Partner certificate: CERT_ISSUER_DN_PRINTABLE=CN=irrcerta.abc1234.informatica.com, OU=zOS.Admin, O=Informatica, C=GB 22: Partner certificate: CERT_VALID_TO=20401231232959 23: Partner certificate: CERT_VALID_TO_EX=23:29:59 31-12-2040 Terminating ----------- rc=0 from SSW_Env_Close() rc=0 from closesocket() on socket 500 rc=0 from OS_Unload_Module() on SSLOPNWP Ping has run successfully at the TCPIP / SSL level. Check displays in remote listener log.

0 COMMENTS

We’d like to hear from you!