Hi Brad,

Just curious.

Does geturi have a fixed chunk size or variable ?

Thanks
Don

 

Don Brown

Senior Consultant
 
[1]OneTeam IT Pty Ltd
P: 1300 088 400

-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of Brad
Stone
Sent: Thursday, 16 January 2025 10:49 AM
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: Re: HTTPAPIR4 gsk_secure_soc_write rc=406 issue

That normally means the connection was severed on one end or the other.
I'm sure Scott will chime in, but if you wanted to test it with GETURI
you're welcome to download and get a temp key to try it to see if it does
the same thing.

Or, if you can change the chunk size to something bigger in HTTPAPI, maybe
the other side is timing out with the smaller chunks? I think I default
chunks to 32k in GETURI (old limit from a long time ago).

I've seen the error before, but normally it's an issue on the server side
where it just decided to "hang up" on the connection.

On Wed, Jan 15, 2025 at 3:43 PM Don Brown via MIDRANGE-L <
midrange-l@xxxxxxxxxxxxxxxxxx> wrote:

> We are using HTTPAPIR4 to upload a backup file to Azure.
>
> We have enabled large file support and successfully uploaded files
> that are 3-5 GB
>
> But a larger file is failing with the error (GSKit) I/O: Broken pipe.
>
> To eliminate the size of the debug file being an issue we turned off
> debug in HTTPAPIR4 but still process did not complete.
>
> We turned on high level logging and below is a snipet from the log
> that shows the error. Our testing shows that the issue does not occur
> at exactly the same place in the file and we have not been able to
> determine the cause.
>
> From the log we can see the process chugging on happily writing chunks
> of length 8192 until the 406 error then ends due to the error.
>
> The entire debug log is way too big to include in full.
>
> I am hoping someone can point us in the right direction to understand
> this error and how we can resolve it.
>
> Thanks
> Don
>
> 2025-01-15-14.40.00.860000: sendraw2(): comm_blockWrite returned 8192
> 2025-01-15-14.40.00.860000: sendraw2(): data sent=481976320, chunk
> size=8192, calling Callback to get data...
> 2025-01-15-14.40.00.860000: sendraw2(): data sent=481976320, chunk
> len=8192, timeout=60, calling comm_BlockWrite...
> 2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=502, len=0
> 2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): before select socket
> fd=3, flags=00000084, blocking=0
> 2025-01-15-14.40.00.860000: CommSSL_BlockWrite(): before select:
> select fd=3, readset=*NULL, writeset=000000080000000000000000000000
> 2025-01-15-14.40.00.874000: CommSSL_BlockWrite(): after select socket
> fd=3, flags=00000084, blocking=0
> 2025-01-15-14.40.00.874000: CommSSL_BlockWrite(): after select: select
> fd=3, readset=*NULL, writeset=0000000800000000000000000000000
> 2025-01-15-14.40.00.874000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=0, len=8192
> @@@@@@@@@@@@@@@@@@@@@@@ðôñù@÷÷ø@ôóù@@@ððñððñððñððñððñððñÁ ððððððöùõ
> Öòðððò@âãÅ×ÈÅÕ@ÆÅÙÙÉÅ@@@@@@@@@@@@@@@@@@@@@@@@@@õð@ÒÅÁãâ@âãÙÅÅã@
>
> @@@@@@@@@@@@ÙÉÃÈÓÁÕÄâ@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ØÓÄ@@@@@@@@@@@@@@@
> @@@@@@@@@@@@@@@@@@@@@@ôð÷÷óó÷õ@óð÷ñ@@@@@@ðôðñ@ððð@ñóõ@@@@@@@@@
>
> 2025-01-15-14.40.00.875000: sendraw2(): comm_blockWrite returned 8192
> 2025-01-15-14.40.00.875000: sendraw2(): data sent=481984512, chunk
> size=8192, calling Callback to get data...
> 2025-01-15-14.40.00.875000: sendraw2(): data sent=481984512, chunk
> len=8192, timeout=60, calling comm_BlockWrite...
> 2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=0, len=8192 ðððððñððððððððñÁ ððððððöùõ
> Öòðõðõ@ÁÂÄäÓ@ÔÁÕÁÆ@ÂäÒâÈ@@@@@@@@@@@@@@@@@@@@@@@øù@æÉÕâÓÖæ@âãÙÅÅã@@@@@@
> @@@@@@@@@@@@@@@@@ÄÁÙÙÁ@@@@@@@@@@@@
> @@@@@@@@@@@ØÓÄ@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ôññõ@@@@@@@@@@@@@@@
> ðôð÷@ùñù@ò÷ô@@@@@@@@@@@@@@@@@@ððððððððóððððððððóÁ
> ððððððöùõ Ö
>
> 2025-01-15-14.40.00.875000: sendraw2(): comm_blockWrite returned 8192
> 2025-01-15-14.40.00.875000: sendraw2(): data sent=481992704, chunk
> size=8192, calling Callback to get data...
> 2025-01-15-14.40.00.875000: sendraw2(): data sent=481992704, chunk
> len=8192, timeout=60, calling comm_BlockWrite...
> 2025-01-15-14.40.00.875000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.40.00.876000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=406, len=0
> 2025-01-15-14.40.00.876000: (GSKit) I/O: Broken pipe.
> 2025-01-15-14.40.00.876000: ssl_error(406): (GSKit) I/O: Broken pipe.
> 2025-01-15-14.40.00.876000: SetError() #55: CommSSL_BlockWrite: send:
> (GSKit) I/O: Broken pipe.
> 2025-01-15-14.40.00.876000: sendraw2(): comm_blockWrite returned -1
> 2025-01-15-14.40.00.876000: http_close(): entered ************End of
> Data********************
>
> ************Beginning of data************** HTTPAPI Ver 1.42 released
> 2020-10-12 NTLM Ver 1.4.0 released 2014-12-22
> OS/400 Ver V7R4M0
>
> 2025-01-15-14.31.29.577000: New iconv() objects set, PostRem=819.
> PostLoc=0. ProtRem=819. ProtLoc=0
> 2025-01-15-14.31.29.577000: http_persist_open(): entered
> 2025-01-15-14.31.29.579000: http_long_ParseURL(): entered
> 2025-01-15-14.31.29.579000: DNS resolver retrans: 2
> 2025-01-15-14.31.29.579000: DNS resolver retry : 2
> 2025-01-15-14.31.29.579000: DNS resolver options: x'00000136'
> 2025-01-15-14.31.29.579000: DNS default domain: **********************
> 2025-01-15-14.31.29.579000: DNS server found: 8.8.8.8
> 2025-01-15-14.31.29.601000: https_init(): entered
> 2025-01-15-14.31.29.601000: QSSLPCL = *OPSYS
> 2025-01-15-14.31.29.601000: SSL version 2 support disabled
> 2025-01-15-14.31.29.601000: SSL version 3 support disabled
> 2025-01-15-14.31.29.601000: Old interface to TLS version 1.0 support
> enabled
> 2025-01-15-14.31.29.601000: TLS version 1.0 support enabled
> 2025-01-15-14.31.29.601000: TLS version 1.0 support enabled
> 2025-01-15-14.31.29.601000: TLS version 1.1 support enabled
> 2025-01-15-14.31.29.601000: TLS version 1.2 support enabled
> 2025-01-15-14.31.29.601000: initializing GSK environment
> 2025-01-15-14.31.29.704000: GSK Environment now available
> 2025-01-15-14.31.29.704000:
> ----------------------------------------------------------------------
> ---------------
> 2025-01-15-14.31.29.704000: Dump of local-side certificate information:
> 2025-01-15-14.31.29.704000:
> ----------------------------------------------------------------------
> ---------------
> 2025-01-15-14.31.29.704000: Nagle's algorithm (TCP_NODELAY) disabled.
> 2025-01-15-14.31.29.724000: SNI hostname set to:
> bwitmasbu.blob.core.windows.net
> 2025-01-15-14.31.29.765000:
> ----------------------------------------------------------------------
> ---------------
> 2025-01-15-14.31.29.765000: Dump of server-side certificate information:
> 2025-01-15-14.31.29.765000:
> ----------------------------------------------------------------------
> ---------------
> 2025-01-15-14.31.29.765000: Cert Validation Code = 0
> 2025-01-15-14.31.29.781000: -----BEGIN CERTIFICATE-----
> 2025-01-15-14.31.29.782000: -----END CERTIFICATE----- Serial Number:
> 33:00:BE:F5:4D:E1:54:38:54:17:5C:9A:A6:00:00:00:BE:F5:4D
> Common Name: *.blob.core.windows.net
> Country: US
> State/Province: WA
> Locality: Redmond
> Org Unit: Microsoft Corporation
> Issuer CN: Microsoft Azure RSA TLS Issuing CA 07 Issuer Country: US
> Issuer Org: Microsoft Corporation
> Version: 3
> not before: 20241029055028
> Unknown Field: 05:50:28 29-10-2024
> not after: 20250427055028
> Unknown Field: 05:50:28 27-04-2025
> pub key alg: 1.2.840.113549.1.1.1
> pub key alg: 1.2.840.113549.1.1.1
> signature algorithm: 1.2.840.113549.1.1.12 Unknown Field:
> 0382010F003082010A0282010100B Unknown Field: 2048 Unknown Field:
> 8921195EBF800F0CE57E90D9F18AB Unknown Field: 1.2.840.113549.2.5
> Unknown Field: 5A26298A7B4AED818DA511F4F3523 Unknown Field:
> 45469BCB102BFA06BCF1D0930C4E4 Unknown Field: 5 Unknown Field:
> *.z50.blob.storage.azure.net Unknown Field:
> *.z49.blob.storage.azure.net Unknown Field:
> *.z48.blob.storage.azure.net .....
> Unknown Field: *.z2.blob.storage.azure.net Unknown Field:
> *.z1.blob.storage.azure.net Unknown Field: *.blob.storage.azure.net
> Unknown Field: *.syd27prdstr03a.store.core.windows.net
> Unknown Field: *.blob.core.windows.net Unknown Field: 0 Unknown Field:
> 1.3.6.1.5.5.7.3.1 Unknown Field: 1.3.6.1.5.5.7.3.2 Unknown Field:
> 2.23.140.1.2.2 Unknown Field: 1.3.6.1.4.1.311.76.509.1.1 Unknown
> Field:
>
[2]http://www.microsoft.com/pkiops/crl/Microsoft%20Azure%20RSA%20TLS%20Is
> suing%20CA%2007.crl Unknown Field: [3]http://oneocsp.microsoft.com/ocsp
> Unknown Field:
>
[4]http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20
> Issuing%20CA%2007%20-%20xsign.crt
>
> 2025-01-15-14.31.29.784000: SetError() #49: SSL_protocol: Unknown
> protocol
> 5000
> 2025-01-15-14.31.29.784000: Protocol Used:
> 2025-01-15-14.31.29.784000: Protocol Used:
> 2
> 2025-01-15-14.31.29.784000: http_persist_req2(PUT) entered.
> 2
> 2025-01-15-14.31.29.784000: http_long_ParseURL(): entered
> 2
> 2025-01-15-14.31.29.784000: http_long_ParseURL(): entered
> 2
> 2025-01-15-14.31.29.784000: do_oper2(PUT): entered
> 2
> 2025-01-15-14.31.29.784000: There are 0 cookies in the cache
> 2
> 2025-01-15-14.31.29.784000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0 2
> 2025-01-15-14.31.29.784000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=0, len=285 P
> PUT
> /bwitmasbu/LIB_DATA_20250115?SI=FileUploads&SIG=FhFz%2FW1evPlFrqm%2BDr
> xp3BUQAF9810h1HU2M5YmS4iw%3D&SPR=https&SR=c&ST=2024-10-01TH
> Host: bwitmasbu.blob.core.windows.net
> U
> User-Agent: http-api/1.43
> C
> Content-Type: text/xml
> C
> Content-Length: 83833602209
>
> 2
> 2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0 2
> 2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=0, len=26 x
> x-ms-blob-type:BlockBlob
>
> 2
> 2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=0, len=2
>
>
> 2025-01-15-14.31.29.785000: sendraw2(): entered
> 2025-01-15-14.31.29.785000: sendraw2(): data sent=0, chunk size=8192,
> calling Callback to get data...
> 2025-01-15-14.31.29.785000: sendraw2(): data sent=0, chunk len=8192,
> timeout=60, calling comm_BlockWrite...
> 2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.31.29.785000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=0, len=8192
>
ÇÅÕððññðåÖÓñÇÅÕððñð@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\åÙãòõöÒ@@
> B@ ß@ ß@
> ðð
> ` ò ó
> PÄÕ 0 PÄÕ 0P PÄÕ 0 ãÕ
> 2025-01-15-14.31.29.785000: sendraw2(): comm_blockWrite returned 8192
> 2025-01-15-14.31.29.785000: sendraw2(): data sent=8192, chunk
> size=8192, calling Callback to get data...
> 2025-01-15-14.31.29.785000: sendraw2(): data sent=8192, chunk
> len=8192, timeout=60, calling comm_BlockWrite...
> 2025-01-15-14.31.29.785000: CommSSL_BlockWrite():
> gsk_secure_soc_write socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.31.29.786000: CommSSL_BlockWrite():
> gsk_secure_soc_write rc=0, len=8192
>
> We do see some intermittent rc=502 like this in the log
> 2025-01-15-14.31.30.066000: sendraw2(): comm_blockWrite returned 8192
> 2025-01-15-14.31.30.066000: sendraw2(): data sent=548864, chunk
> size=8192, calling Callback to get data...
> 2025-01-15-14.31.30.066000: sendraw2(): data sent=548864, chunk
> len=8192, timeout=60, calling comm_BlockWrite...
> 2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=502, len=0
> 2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): before select socket
> fd=3, flags=00000084, blocking=0
> 2025-01-15-14.31.30.066000: CommSSL_BlockWrite(): before select:
> select fd=3, readset=*NULL, writeset=000000080000000000000000000000
> 2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): after select socket
> fd=3, flags=00000084, blocking=0
> 2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): after select: select
> fd=3, readset=*NULL, writeset=0000000800000000000000000000000
> 2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): gsk_secure_soc_write
> socket fd=3, flags=00000084, blocking=0
> 2025-01-15-14.31.30.080000: CommSSL_BlockWrite(): gsk_secure_soc_write
> rc=0, len=8192
>
> Brisbane - Sydney - Melbourne
>
>
> Don Brown
>
> Senior Consultant
>
>
>
>
> P: 1300 088 400
>
>
>
>
> DISCLAIMER. Before opening any attachments, check them for viruses and
> defects. This email and its attachments may contain confidential
> information. If you are not the intended recipient, please do not
> read, distribute or copy this email or its attachments but notify
> sender and delete it. Any views expressed in this email are those of
> the individual sender
> --
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
> list To post a message email: MIDRANGE-L@xxxxxxxxxxxxxxxxxx To
> subscribe, unsubscribe, or change list options,
> visit: [5]https://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxxxxxxxx
> Before posting, please take a moment to review the archives at
> [6]https://archive.midrange.com/midrange-l.
>
> Please contact support@xxxxxxxxxxxxxxxxxxxx for any subscription
> related questions.
>
>
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list To post a message email: MIDRANGE-L@xxxxxxxxxxxxxxxxxx To subscribe,
unsubscribe, or change list options,
visit: [7]https://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxxxxxxxx
Before posting, please take a moment to review the archives at
[8]https://archive.midrange.com/midrange-l.

Please contact support@xxxxxxxxxxxxxxxxxxxx for any subscription related
questions.

--
Message protected by MailGuard: e-mail anti-virus, anti-spam and content
filtering.
[9]https://www.mailguard.com.au

References

Visible links
1. https://www.oneteamit.com.au/
2. http://www.microsoft.com/pkiops/crl/Microsoft%20Azure%20RSA%20TLS%20Is
3. http://oneocsp.microsoft.com/ocsp
4. http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20
5. https://lists.midrange.com/mailman/listinfo/midrange-l
6. https://archive.midrange.com/midrange-l.
7. https://lists.midrange.com/mailman/listinfo/midrange-l
8. https://archive.midrange.com/midrange-l.
9. https://www.mailguard.com.au/

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.