[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Ftpapi] Another HTTPAPI log question



Hi Scott,

I wonder if you have anything to add about the time take to do the SSL part of HTTPAPI?
I've included another call below and as you can see, this call takes 12 seconds (highlighted in green) to process this on the 1st call. If we are relying on fast calls, do we need to structure this so that only one SSL is done per day or are we missing something else that need setting to make it quicker?

Thanks, Lawrence

HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0

2020-04-01-17.14.29.326000: http_url_post(): entered
2020-04-01-17.14.29.357000: http_persist_open(): entered
2020-04-01-17.14.29.357000: http_long_ParseURL(): entered
2020-04-01-17.14.29.357000: DNS resolver retrans: 2
2020-04-01-17.14.29.357000: DNS resolver retry  : 2
2020-04-01-17.14.29.357000: DNS resolver options: x'00000136'
2020-04-01-17.14.29.358000: DNS default domain: PARK.LAN
2020-04-01-17.14.29.358000: DNS server found: 10.1.2.15
2020-04-01-17.14.29.358000: DNS server found: 10.1.2.16
2020-04-01-17.14.29.367000: https_init(): entered
2020-04-01-17.14.29.367000: QSSLPCL = *OPSYS
2020-04-01-17.14.29.367000: SSL version 2 support disabled
2020-04-01-17.14.29.367000: SSL version 3 support disabled
2020-04-01-17.14.29.367000: Old interface to TLS version 1.0 support enabled
2020-04-01-17.14.29.368000: TLS version 1.0 support enabled
2020-04-01-17.14.29.368000: TLS version 1.1 support enabled
2020-04-01-17.14.29.368000: TLS version 1.2 support enabled
2020-04-01-17.14.41.546000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.546000: Dump of local-side certificate information:
2020-04-01-17.14.41.546000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.546000: Nagle's algorithm (TCP_NODELAY) disabled.
2020-04-01-17.14.41.547000: SNI hostname set to: mastercardwrapperservice.prl.co.uk
2020-04-01-17.14.41.651000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.651000: Dump of server-side certificate information:
2020-04-01-17.14.41.652000: -------------------------------------------------------------------------------------
2020-04-01-17.14.41.652000: Cert Validation Code = 0
2020-04-01-17.14.41.799000: -----BEGIN CERTIFICATE-----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=
2020-04-01-17.14.41.800000: -----END CERTIFICATE-----
Serial Number: 00:EA:6B:E5:85:50:E2:9F:73
Common Name: mastercardwrapperservice.prl.co.uk
Country: GB
State/Province: Merseyside
Locality: Birkenhead
Org Unit: Park Group plc
Org: GTS
Issuer CN: mastercardwrapperservice.prl.co.uk
Issuer Country: GB
Issuer State/Province: Merseyside
Issuer Locality: Birkenhead
Issuer Org: Park Group plc
Issuer Org Unit: GTS
Version: 3
not before: 20160916093454
Unknown Field: 09:34:54 16-09-2016
not after: 20251203083454
Unknown Field: 08:34:54 03-12-2025
pub key alg: 1.2.840.113549.1.1.1
signature algorithm: 1.2.840.113549.1.1.11
Unknown Field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
Unknown Field: 2048
Unknown Field: C435760EB4286E3E9FD5DD77986221CD
Unknown Field: 1.2.840.113549.2.5
Unknown Field: FAA5D37EF415959057E2E1719772B538E73DD4D6
Unknown Field: 2AFCFE318E71A1CEA15D91B1167BD4A784ED37227D74A279553BFCBC08CA91D3
Unknown Field: 1

2020-04-01-17.14.41.804000: Protocol Used: TLS Version 1.2
2020-04-01-17.14.41.804000: http_persist_post(): entered
2020-04-01-17.14.41.804000: http_persist_req(POST) entered.
2020-04-01-17.14.41.804000: http_long_ParseURL(): entered
2020-04-01-17.14.41.804000: http_long_ParseURL(): entered
2020-04-01-17.14.41.804000: do_oper(POST): entered
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=5, flags=00000084, blocking=0
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=206
POST /mastercard-wrapper-service/CardUnload?wsdl HTTP/1.1
Host: mastercardwrapperservice.prl.co.uk
User-Agent: http-api/1.39
Content-Type: text/xml; charset=UTF-8
SOAPAction: ""
Content-Length: 858


2020-04-01-17.14.41.805000: senddoc(): entered
2020-04-01-17.14.41.805000: senddoc(): data left=858, chunk size=858, timeout=60, calling comm_blockWrite...
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=5, flags=00000084, blocking=0
2020-04-01-17.14.41.805000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=858
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ser="http://service.mastercard.ws.parkgroup.co.uk/"> <soapenv:Header><wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" ><wsse:UsernameToken><wsse:Username>devsuppg@xxxxxxxxxxxxxxx</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">xxxxxxxxxxxxxxxx</wsse:Password></wsse:UsernameToken></wsse:Security></soapenv:Header><soapenv:Body><ser:handleCardUnload><cardUnloadRequest><cardId>xxxxxxxxxxxxxxxx</cardId><cvv></cvv><pan></pan><parkReference></parkReference></cardUnloadRequest></ser:handleCardUnload></soapenv:Body></soapenv:Envelope>
2020-04-01-17.14.41.806000: senddoc(): comm_blockWrite returned 858
2020-04-01-17.14.41.806000: recvresp(): entered
2020-04-01-17.14.41.806000: recvresp: reading response header, space left=32767
HTTP/1.1 200 OK

2020-04-01-17.14.42.511000: recvresp: reading response header, space left=32750
Date: Wed, 01 Apr 2020 16:15:44 GMT

2020-04-01-17.14.42.511000: recvresp: reading response header, space left=32713
Content-Type: text/xml;charset=utf-8

2020-04-01-17.14.42.511000: recvresp: reading response header, space left=32675
Vary: Accept-Encoding

2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32652
Set-Cookie: JSESSIONID=8256C785FF963BDF866ECB3531C58D80; Path=/mastercard-wrapper-service/; HttpOnly

2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32550
Set-Cookie: TS01a90bac=010c8805f63a1b5e6cf788838d7ee727723cf0f4c9ca077158f2ce4beece6688c3148ef0fe299eea6344081b746e6585c0f7b6d36e; Path=/

2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32411
Set-Cookie: TS014c158a=010c8805f6ec669d8527b7fd922cf1d7d921e384a8ca077158f2ce4beece6688c3148ef0fe5fb7629355d5b751cc8b7f62b393e987897dced7d937cf5818d4b17244db34a2; path=/mastercard-wrapper-service/

2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32213
Transfer-Encoding: chunked

2020-04-01-17.14.42.512000: recvresp: reading response header, space left=32185


2020-04-01-17.14.42.512000: recvresp: empty line, ending header, number of eol chars=2
2020-04-01-17.14.42.512000: recvresp: header resp code = 200  repeating=0
2020-04-01-17.14.42.512000: SetError() #13: HTTP/1.1 200 OK
2020-04-01-17.14.42.512000: recvresp(): end with 200
2020-04-01-17.14.42.513000: recvdoc parms: chunked 0
2020-04-01-17.14.42.513000: recvchunk(): entered
2020-04-01-17.14.42.514000: get_chunk_size(): entered
223

2020-04-01-17.14.42.514000: chunk size = 547
2020-04-01-17.14.42.514000: get_chunk_size returned 547
2020-04-01-17.14.42.514000: calling comm_blockread
<?xml version='1.0' encoding='UTF-8'?><S:Envelope xmlns:S="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"><SOAP-ENV:Header/><S:Body><ns2:handleCardUnloadResponse xmlns:ns2="http://service.mastercard.ws.parkgroup.co.uk/"><cardUnloadResponse><amountUnload>00.00</amountUnload><availableBalance>0.0</availableBalance><blockedAmount>0.0</blockedAmount><currencyCode>GBP</currencyCode><message><status>OK</status></message></cardUnloadResponse></ns2:handleCardUnloadResponse></S:Body></S:Envelope>
2020-04-01-17.14.42.514000: comm_blockread returned 547


2020-04-01-17.14.42.515000: get_chunk_size(): entered
0

2020-04-01-17.14.42.516000: chunk size = 0
2020-04-01-17.14.42.516000: get_chunk_size returned 0
2020-04-01-17.14.42.516000: http_close(): entered
HTTPAPI Ver 1.39 released 2018-03-09
NTLM Ver 1.4.0 released 2014-12-22
OS/400 Ver V7R3M0

2020-04-01-17.14.42.751000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0




From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx <ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx> on behalf of Kevin Bucknum <Kevin@xxxxxxxxxxxxxxxxxxx>
Sent: 18 March 2020 17:11
To: ftpapi@xxxxxxxxxxxxxxxxxxxxxx <ftpapi@xxxxxxxxxxxxxxxxxxxxxx>
Subject: Re: [Ftpapi] Another HTTPAPI log question
 
Personally we just accept it. We aren't calling any services in enough volume to notice the delay.

On Wed, 2020-03-18 at 10:58 +0000, Lawrence Loz wrote:
Maybe the only way around this is to restructure and have a background job running so that this 1st process only happens once a day? Does everyone else just accept this initial delay or do you structure it to keep the connection open? Thanks


From: ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx <ftpapi-bounces@xxxxxxxxxxxxxxxxxxxxxx> on behalf of Kevin Bucknum <Kevin@xxxxxxxxxxxxxxxxxxx>
Sent: Tuesday, March 17, 2020 4:06:02 PM
To: ftpapi@xxxxxxxxxxxxxxxxxxxxxx <ftpapi@xxxxxxxxxxxxxxxxxxxxxx>
Subject: Re: [Ftpapi] Another HTTPAPI log question
 
The blue and the first green are just reading the configuration of SSL on your box. Between the first green and the dump of the local certificate, HTTPAPI calls the system functions to initialize SSL as a client. I suspect that it is the call to gsk_environment_init that is your delay, but I'm not sure how that could be speed up. I just ran a quick test and I'm almost 1/2 a second. This is on a 9009-41A running with 5 cores.

2020-03-17-11.01.27.751000: TLS version 1.2 support enabled            
2020-03-17-11.01.28.203000: -------------------------------------------
2020-03-17-11.01.28.203000: Dump of local-side certificate information:


On Tue, 2020-03-17 at 15:27 +0000, Lawrence Loz wrote:
Hi,

Thanks for your previous replies. I'm currently getting the WEB servers developers to check their timings, as they also call another external webservice, it could be down to that.

I have another similar problem, but the holdup is in a different portion of the HTTPAPI log, again only on the 1st call to another internal webservice on a different server. The trouble is I don't know what the additional piece of 1st time process is doing, and what can be done to reduce/remove it?

I've highlighted the additional parts in the 1st run in blue and green, the time issue seems to be in the bit in green?

Thanks 🙂

1st run

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.27.670000: http_persist_open(): entered

2020-03-17-14.31.27.691000: http_long_ParseURL(): entered

2020-03-17-14.31.27.691000: DNS resolver retrans: 2

2020-03-17-14.31.27.691000: DNS resolver retry  : 2

2020-03-17-14.31.27.691000: DNS resolver options: x'00000136'

2020-03-17-14.31.27.692000: DNS default domain: PARK.LAN

2020-03-17-14.31.27.692000: DNS server found: 10.1.2.15

2020-03-17-14.31.27.692000: DNS server found: 10.1.2.16

2020-03-17-14.31.27.695000: https_init(): entered

2020-03-17-14.31.27.696000: QSSLPCL = *OPSYS

2020-03-17-14.31.27.696000: SSL version 2 support disabled

2020-03-17-14.31.27.696000: SSL version 3 support disabled

2020-03-17-14.31.27.696000: Old interface to TLS version 1.0 support enabled

2020-03-17-14.31.27.696000: TLS version 1.0 support enabled

2020-03-17-14.31.27.696000: TLS version 1.1 support enabled

2020-03-17-14.31.27.696000: TLS version 1.2 support enabled

2020-03-17-14.31.28.854000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.855000: Dump of local-side certificate information:

2020-03-17-14.31.28.855000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.855000: Nagle's algorithm (TCP_NODELAY) disabled.

2020-03-17-14.31.28.855000: SNI hostname set to: uatflexecash.park.lan

2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.869000: Dump of server-side certificate information:

2020-03-17-14.31.28.869000: -------------------------------------------------------------------------------------

2020-03-17-14.31.28.869000: Cert Validation Code = 0

2020-03-17-14.31.28.902000: -----BEGIN CERTIFICATE-----

MIID4TCCAsmgAwIBAgIJANax6Zu1+6xSMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYD

VQQGEwJ1azETMBEGA1UECAwKTWVyc2V5c2lkZTETMBEGA1UEBwwKYmlya2VuaGVh

ZDEXMBUGA1UECgwOUGFyayBHcm91cCBQTEMxFDASBgNVBAsMC1ZhbGxleSBSb2Fk

MR4wHAYDVQQDDBV1YXRmbGV4ZWNhc2gucGFyay5sYW4wHhcNMTYxMTAxMDkxMTUw

WhcNMjYwMTE4MDkxMTUwWjCBhjELMAkGA1UEBhMCdWsxEzARBgNVBAgMCk1lcnNl

eXNpZGUxEzARBgNVBAcMCmJpcmtlbmhlYWQxFzAVBgNVBAoMDlBhcmsgR3JvdXAg

UExDMRQwEgYDVQQLDAtWYWxsZXkgUm9hZDEeMBwGA1UEAwwVdWF0ZmxleGVjYXNo

LnBhcmsubGFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3Mri8o2G

wZRS6zZ5HIZY5L1zuVDow+G3ugOq2bFH7GaRaHyIKeiZqoyIpTRzegCavDCxsNQV

kenscNSp+7cjyOVE/mEO5XRA6C7uw+rEYkLYGuEC0ypl+YFGISMjnUccbvl/2gvk

8JhbBCC+X7Iw7A624NK1a/Knii9RaMuIFyJ21yL84bSjx+9qSqmeWuGIVCSn5QnM

eQGuoPsfqXTqRNP9ntksi1VRkOr8YivzBFBjfFYsIQSKhtiyFZsr/6tdXPO6/SWR

Mc5g/tY5B8WvQgec+Y+jgZ1naKQspSyuChgT70bzG802+IaS3s0Vcc3u5fN6FTHm

mADsmy+1gqEVxwIDAQABo1AwTjAdBgNVHQ4EFgQUOiQGkidtTVe3j7V5UI5UDGRC

aMIwHwYDVR0jBBgwFoAUOiQGkidtTVe3j7V5UI5UDGRCaMIwDAYDVR0TBAUwAwEB

/zANBgkqhkiG9w0BAQsFAAOCAQEABdavDLf4795AG7FovIl+m4zP/ou+AtbfCWqQ

v+iHjClVM19/vJYp3HiIuUIk3cgowlVJNPYLqow5Mv5OcXfjwsQGWlF7dLoubX0S

pfuQDKgvZKX5qK7GGtll4TtEqyt1M9j3s5Q+D5carym/xl1kiO1IWLoiBsCjDqvc

fg3Y/lGzicMZU9iiAh9eW9Cp5xH/vylg1j8jhH0Zzjt5z41TPb4ojxuwqSHhvJ48

n95IDAgmwdb552+UFxAR7S5nikL9hqbczMXv7Qmdf1rBrwX+oJTpvUx8ehyO0ety

zm9ug0he/zyWeiwyEBDpujaHVOjFOsM665QomctvUfwvURiyfg==

2020-03-17-14.31.28.902000: -----END CERTIFICATE-----

Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52

Common Name: uatflexecash.park.lan

Country: uk

State/Province: Merseyside

Locality: birkenhead

Org Unit: Park Group PLC

Org: Valley Road

Issuer CN: uatflexecash.park.lan

Issuer Country: uk

Issuer State/Province: Merseyside

Issuer Locality: birkenhead

Issuer Org: Park Group PLC

Issuer Org Unit: Valley Road

Version: 3

not before: 20161101091150

Unknown Field: 09:11:50 01-11-2016

not after: 20260118091150

Unknown Field: 09:11:50 18-01-2026

pub key alg: 1.2.840.113549.1.1.1

signature algorithm: 1.2.840.113549.1.1.11

Unknown Field: 0382010F003082010A0282010100DCCAE2F28D86C19452EB36791C8658E4BD73B950E8C3E1B7BA03AAD9B147EC6691687C8829E899AA8C88A534737A009ABC30B1B0D41591E9EC70D4A9FBB723C8E544FE610EE57440E82EEEC3EAC46242D81AE102D32A65F981462123239D471C6EF97FDA0BE4F0985B0420BE5FB230EC0EB6E0D2B56BF2A78A2F5168CB88172276D722FCE1B4A3C7EF6A4AA99E5AE1885424A7E509CC7901AEA0FB1FA974EA44D3FD9ED92C8B555190EAFC622BF30450637C562C21048A86D8B2159B2BFFAB5D5CF3BAFD259131CE60FED63907C5AF42079CF98FA3819D6768A42CA52CAE0A1813EF46F31BCD36F88692DECD1571CDEEE5F37A1531E69800EC9B2FB582A115C70203010001

Unknown Field: 2048

Unknown Field: D6DDA66646FB208C03203D3059AA3945

Unknown Field: 1.2.840.113549.2.5

Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD

Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4

Unknown Field: 1

 

2020-03-17-14.31.28.904000: Protocol Used: TLS Version 1.2

2020-03-17-14.31.28.904000: http_persist_post(): entered

2020-03-17-14.31.28.904000: http_persist_req(POST) entered.

2020-03-17-14.31.28.904000: http_long_ParseURL(): entered

2020-03-17-14.31.28.904000: http_long_ParseURL(): entered

2020-03-17-14.31.28.905000: do_oper(POST): entered

2020-03-17-14.31.28.905000: There are 0 cookies in the cache

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=204

POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1

Host: uatflexecash.park.lan:9443

User-Agent: http-api/1.39

Content-Type: text/xml;charset=UTF-8

SOAPAction: ""

Content-Length: 943

 

 

2020-03-17-14.31.28.905000: senddoc(): entered

2020-03-17-14.31.28.905000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.28.905000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943

<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest> </soapenv:Body> </soapenv:Envelope>

2020-03-17-14.31.28.905000: senddoc(): comm_blockWrite returned 943

2020-03-17-14.31.28.906000: recvresp(): entered

2020-03-17-14.31.28.906000: recvresp: reading response header, space left=32767

HTTP/1.1 200 OK

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32750

Content-Type: text/xml; charset=UTF-8

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32711

Content-Language: en-US

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32686

Date: Tue, 17 Mar 2020 14:32:30 GMT

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32649

Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32510

Transfer-Encoding: chunked

 

2020-03-17-14.31.28.964000: recvresp: reading response header, space left=32482

 

 

2020-03-17-14.31.28.965000: recvresp: empty line, ending header, number of eol chars=2

2020-03-17-14.31.28.965000: recvresp: header resp code = 200  repeating=0

2020-03-17-14.31.28.965000: SetError() #13: HTTP/1.1 200 OK

2020-03-17-14.31.28.965000: recvresp(): end with 200

2020-03-17-14.31.28.965000: recvdoc parms: chunked 0

2020-03-17-14.31.28.965000: header_load_cookies() entered

2020-03-17-14.31.28.965000: cookie_parse() entered

2020-03-17-14.31.28.965000: cookie =  TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

2020-03-17-14.31.28.965000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c

2020-03-17-14.31.28.965000: cookie attr Path=/

2020-03-17-14.31.28.965000: recvchunk(): entered

2020-03-17-14.31.28.965000: get_chunk_size(): entered

242

 

2020-03-17-14.31.28.966000: chunk size = 578

2020-03-17-14.31.28.966000: get_chunk_size returned 578

2020-03-17-14.31.28.966000: calling comm_blockread

<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>

2020-03-17-14.31.28.966000: comm_blockread returned 578

 

 

2020-03-17-14.31.28.966000: get_chunk_size(): entered

0

 

2020-03-17-14.31.28.966000: chunk size = 0

2020-03-17-14.31.28.966000: get_chunk_size returned 0

2020-03-17-14.31.28.966000: http_close(): entered

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.31.857000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0

 

2nd run

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.31.859000: http_persist_open(): entered

2020-03-17-14.31.31.862000: http_long_ParseURL(): entered

2020-03-17-14.31.31.862000: DNS resolver retrans: 2

2020-03-17-14.31.31.862000: DNS resolver retry  : 2

2020-03-17-14.31.31.862000: DNS resolver options: x'00000136'

2020-03-17-14.31.31.862000: DNS default domain: PARK.LAN

2020-03-17-14.31.31.862000: DNS server found: 10.1.2.15

2020-03-17-14.31.31.862000: DNS server found: 10.1.2.16

2020-03-17-14.31.31.863000: Nagle's algorithm (TCP_NODELAY) disabled.

2020-03-17-14.31.31.863000: SNI hostname set to: uatflexecash.park.lan

2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------

2020-03-17-14.31.31.864000: Dump of server-side certificate information:

2020-03-17-14.31.31.864000: -------------------------------------------------------------------------------------

2020-03-17-14.31.31.864000: Cert Validation Code = 0

2020-03-17-14.31.31.878000: -----BEGIN CERTIFICATE-----

MIID4TCCAsmgAwIBAgIJANax6Zu1+6xSMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYD

VQQGEwJ1azETMBEGA1UECAwKTWVyc2V5c2lkZTETMBEGA1UEBwwKYmlya2VuaGVh

ZDEXMBUGA1UECgwOUGFyayBHcm91cCBQTEMxFDASBgNVBAsMC1ZhbGxleSBSb2Fk

MR4wHAYDVQQDDBV1YXRmbGV4ZWNhc2gucGFyay5sYW4wHhcNMTYxMTAxMDkxMTUw

WhcNMjYwMTE4MDkxMTUwWjCBhjELMAkGA1UEBhMCdWsxEzARBgNVBAgMCk1lcnNl

eXNpZGUxEzARBgNVBAcMCmJpcmtlbmhlYWQxFzAVBgNVBAoMDlBhcmsgR3JvdXAg

UExDMRQwEgYDVQQLDAtWYWxsZXkgUm9hZDEeMBwGA1UEAwwVdWF0ZmxleGVjYXNo

LnBhcmsubGFuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3Mri8o2G

wZRS6zZ5HIZY5L1zuVDow+G3ugOq2bFH7GaRaHyIKeiZqoyIpTRzegCavDCxsNQV

kenscNSp+7cjyOVE/mEO5XRA6C7uw+rEYkLYGuEC0ypl+YFGISMjnUccbvl/2gvk

8JhbBCC+X7Iw7A624NK1a/Knii9RaMuIFyJ21yL84bSjx+9qSqmeWuGIVCSn5QnM

eQGuoPsfqXTqRNP9ntksi1VRkOr8YivzBFBjfFYsIQSKhtiyFZsr/6tdXPO6/SWR

Mc5g/tY5B8WvQgec+Y+jgZ1naKQspSyuChgT70bzG802+IaS3s0Vcc3u5fN6FTHm

mADsmy+1gqEVxwIDAQABo1AwTjAdBgNVHQ4EFgQUOiQGkidtTVe3j7V5UI5UDGRC

aMIwHwYDVR0jBBgwFoAUOiQGkidtTVe3j7V5UI5UDGRCaMIwDAYDVR0TBAUwAwEB

/zANBgkqhkiG9w0BAQsFAAOCAQEABdavDLf4795AG7FovIl+m4zP/ou+AtbfCWqQ

v+iHjClVM19/vJYp3HiIuUIk3cgowlVJNPYLqow5Mv5OcXfjwsQGWlF7dLoubX0S

pfuQDKgvZKX5qK7GGtll4TtEqyt1M9j3s5Q+D5carym/xl1kiO1IWLoiBsCjDqvc

fg3Y/lGzicMZU9iiAh9eW9Cp5xH/vylg1j8jhH0Zzjt5z41TPb4ojxuwqSHhvJ48

n95IDAgmwdb552+UFxAR7S5nikL9hqbczMXv7Qmdf1rBrwX+oJTpvUx8ehyO0ety

zm9ug0he/zyWeiwyEBDpujaHVOjFOsM665QomctvUfwvURiyfg==

2020-03-17-14.31.31.878000: -----END CERTIFICATE-----

Serial Number: 00:D6:B1:E9:9B:B5:FB:AC:52

Common Name: uatflexecash.park.lan

Country: uk

State/Province: Merseyside

Locality: birkenhead

Org Unit: Park Group PLC

Org: Valley Road

Issuer CN: uatflexecash.park.lan

Issuer Country: uk

Issuer State/Province: Merseyside

Issuer Locality: birkenhead

Issuer Org: Park Group PLC

Issuer Org Unit: Valley Road

Version: 3

not before: 20161101091150

Unknown Field: 09:11:50 01-11-2016

not after: 20260118091150

Unknown Field: 09:11:50 18-01-2026

pub key alg: 1.2.840.113549.1.1.1

signature algorithm: 1.2.840.113549.1.1.11

Unknown Field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

Unknown Field: 2048

Unknown Field: D6DDA66646FB208C03203D3059AA3945

Unknown Field: 1.2.840.113549.2.5

Unknown Field: A9AADCC0CA3B09EFF433B9C3392E76E17ED618BD

Unknown Field: E168B5563FA73D5F4F3844BB049E5564E13261E0AAA0A8937ECC2D44068777A4

Unknown Field: 1

 

2020-03-17-14.31.31.879000: Protocol Used: TLS Version 1.2

2020-03-17-14.31.31.879000: http_persist_post(): entered

2020-03-17-14.31.31.879000: http_persist_req(POST) entered.

2020-03-17-14.31.31.880000: http_long_ParseURL(): entered

2020-03-17-14.31.31.880000: http_long_ParseURL(): entered

2020-03-17-14.31.31.880000: do_oper(POST): entered

2020-03-17-14.31.31.880000: There are 1 cookies in the cache

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=353

POST /cardsystem-secure-webservices/GetCSCAndExpiryDate HTTP/1.1

Host: uatflexecash.park.lan:9443

User-Agent: http-api/1.39

Content-Type: text/xml;charset=UTF-8

SOAPAction: ""

Content-Length: 943

Cookie: $Version=0; TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; $Path=/;

 

 

2020-03-17-14.31.31.880000: senddoc(): entered

2020-03-17-14.31.31.880000: senddoc(): data left=943, chunk size=943, timeout=30, calling comm_blockWrite...

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write socket fd=1, flags=00000084, blocking=0

2020-03-17-14.31.31.880000: CommSSL_BlockWrite(): gsk_secure_soc_write rc=0, len=943

<soapenv:Envelope xmlns:get="http://getcscandexpirydate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsse:UsernameToken wsu:Id="UsernameToken-2D5E5ADFDD33CB994915469428491523"><wsse:Username>iseriesflexuat</wsse:Username><wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">feH5gAbuzegePebracre</wsse:Password> </wsse:UsernameToken></wsse:Security></soapenv:Header> <soapenv:Body><get:getCscAndExpiryDateRequest><pan>6338271658100012769</pan><source>PARK</source><sourceName>PARK</sourceName></get:getCscAndExpiryDateRequest> </soapenv:Body> </soapenv:Envelope>

2020-03-17-14.31.31.880000: senddoc(): comm_blockWrite returned 943

2020-03-17-14.31.31.880000: recvresp(): entered

2020-03-17-14.31.31.880000: recvresp: reading response header, space left=32767

HTTP/1.1 200 OK

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32750

Content-Type: text/xml; charset=UTF-8

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32711

Content-Language: en-US

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32686

Date: Tue, 17 Mar 2020 14:32:33 GMT

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32649

Set-Cookie: TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32510

Transfer-Encoding: chunked

 

2020-03-17-14.31.31.928000: recvresp: reading response header, space left=32482

 

 

2020-03-17-14.31.31.928000: recvresp: empty line, ending header, number of eol chars=2

2020-03-17-14.31.31.929000: recvresp: header resp code = 200  repeating=0

2020-03-17-14.31.31.929000: SetError() #13: HTTP/1.1 200 OK

2020-03-17-14.31.31.929000: recvresp(): end with 200

2020-03-17-14.31.31.929000: recvdoc parms: chunked 0

2020-03-17-14.31.31.929000: header_load_cookies() entered

2020-03-17-14.31.31.929000: cookie_parse() entered

2020-03-17-14.31.31.929000: cookie =  TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c; Path=/

2020-03-17-14.31.31.929000: cookie attr TS01108bfc=010c8805f6fa75263ebeb02daddb61460477dfa571f6eab9061e2b2d9d2449eb77204b3caf11acbe1c6ad2417bee5dba79d41bb70c

2020-03-17-14.31.31.929000: cookie attr Path=/

2020-03-17-14.31.31.929000: recvchunk(): entered

2020-03-17-14.31.31.929000: get_chunk_size(): entered

242

 

2020-03-17-14.31.31.929000: chunk size = 578

2020-03-17-14.31.31.929000: get_chunk_size returned 578

2020-03-17-14.31.31.929000: calling comm_blockread

<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><ns3:getCscAndExpiryDateResponse xmlns:ns2="http://getcscandexpirydate.webservices.cardsystem.parkgroup.rdfgroup.com/" xmlns:ns3="http://getCscAndExpiryDate.secure.webservices.cardsystem.parkgroup.rdfgroup.com/"><panOut>6338271658100012769</panOut><csc>740</csc><expiryDate>0823</expiryDate><status>ACTIVE</status><resultCode>SUCCESSFUL</resultCode><isSuccessful>true</isSuccessful></ns3:getCscAndExpiryDateResponse></soapenv:Body></soapenv:Envelope>

2020-03-17-14.31.31.929000: comm_blockread returned 578

 

 

2020-03-17-14.31.31.929000: get_chunk_size(): entered

0

 

2020-03-17-14.31.31.929000: chunk size = 0

2020-03-17-14.31.31.929000: get_chunk_size returned 0

2020-03-17-14.31.31.929000: http_close(): entered

HTTPAPI Ver 1.39 released 2018-03-09

NTLM Ver 1.4.0 released 2014-12-22

OS/400 Ver V7R3M0

 

2020-03-17-14.31.33.192000: New iconv() objects set, PostRem=1208. PostLoc=0. ProtRem=819. ProtLoc=0

 




  Kevin  Bucknum
                   Senior Programmer Analyst
                   MEDDATA / MEDTRON
                   120 Innwood Drive
                   Covington LA 70433
                   Local: 985-893-2550
                   Toll Free: 877-893-2550
                 https://www.medtronsoftware.com



CONFIDENTIALITY NOTICE

This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged.  This information is intended only for the use of the individual or entity named above.  The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled.  If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED.  If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.



  Kevin  Bucknum
                   Senior Programmer Analyst
                   MEDDATA / MEDTRON
                   120 Innwood Drive
                   Covington LA 70433
                   Local: 985-893-2550
                   Toll Free: 877-893-2550
                 https://www.medtronsoftware.com



CONFIDENTIALITY NOTICE

This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged.  This information is intended only for the use of the individual or entity named above.  The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled.  If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED.  If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.

-- 
_______________________________________________
Ftpapi mailing list
Ftpapi@xxxxxxxxxxxxxxxxxxxxxx
http://scottklement.com/mailman/listinfo/ftpapi