Well, for what it's worth, I just tried it and my job was successful, 
however, I also received the SSLv23/TLSv1 messages. So I used the standard job 
that IBM provided (RFNJOBS) and I turned on Debug SEC. Here is what I got:

220 dhebpcb01 secure FTP server ready.                                         
FC0294 ftpAuth: security values: mech=TLS, tlsmech=ATTLS, tlsreuse=N, sFTP=R, s
C=C, sDC=P                                                                     
FC2971 ftpAuthAttls: AT-TLS policy set as application controlled.              
FU2420 TTLSRule: secure_ftp_client_rule                                        
FU2426 TTLSGroupAction: secure_ftp_client_group                                
FU2432 TTLSEnvironmentAction: secure_ftp_client_env                            
>>> AUTH TLS                                                                   
234 SSLv23/TLSv1                                                               
FC3140 authServerAttls: Start Handshake                                        
FC3171 authServerAttls: FIPS140 not enabled                                    
FC3208 authServerAttls: Using TLSv1.2 protocol                                 
FC3226 authServerAttls: SSL cipher: 0035                                       
FU2135 getCtrlConnCertAttls: Request certificate, size 1581                    
FU2755 getSessionIdAttls: Issuing SIOCTTLSCTL to get decoded AT-TLS Session ID 
Authentication negotiation succeeded                                           
FC2028 setdlevel: entered                                                      
FC2197 setpbsz: entered                                                        
>>> PBSZ 0                                                                     
200 PBSZ=0                                                                     
>>> PROT P                                                                     
200 Command PROT okay.                                                         
Data connection protection is private 
NAME (deliverycb-bld.dhe.ibm.com:SCNS03T):                                     
                                                                               
> P8r12142                                                                     
>>> USER P8r12142                                                              
331 Password required for P8r12142.                                            
PASSWORD:                                                                      
                                                                               
> ***************                                                              
>>> PASS                                                                       
230 virtual user P8r12142 logged in from /12.31.24.5:6457.                     
Command:                                                                       
                                                                               
> CCC                                                                          
> BINARY                                                                       
FC1559 ccc: entered                                                            
FC1757 setclevel: entered                                                      
>>> CCC                                                                        
200 Command Channel Cleared.                                                   
FU2364 clear_connection_attls: Issue Stop request                              
Control connection protection is clear                                         
Command: 
Command:                                                                       
CG1018 find_hfs_file: stat() failed on /u/smpe/smpnts/OSP08132/GIMPAF.XML - EDC
129I No such file or directory. (errno2=0x053B006C)                            
>>> EPSV                                                                       
229 Entering Passive Mode (|||65525|)                                          
>>> RETR 2021042900039/PROD/GIMPAF.XML                                         
150 Opening BINARY mode data connection for 2021042900039/PROD/GIMPAF.XML.     
FU1678 protDataConnAttls: Issuing SIOCTTLSCTL to query policy state            
FU1720 protDataConnAttls: AT-TLS policy set as application controlled.         
FU2420 TTLSRule: secure_ftp_client_rule                                        
FU2426 TTLSGroupAction: secure_ftp_client_group                                
FU2432 TTLSEnvironmentAction: secure_ftp_client_env                            
FU1834 protDataConnAttls: Issuing SIOCTTLSCTL to start handshake               
FU1866 protDataConnAttls: FIPS140 not enabled                                  
FU1907 protDataConnAttls: Using TLSv1.2 protocol                                
<<-----TLSv1.2                            
FU1924 protDataConnAttls: SSL cipher: 0035                                     
FU2255 compareCertAttls: Request certificate, size 1581                        
FU2755 getSessionIdAttls: Issuing SIOCTTLSCTL to get decoded AT-TLS Session ID 
226 Transfer complete.                                                         
197760 bytes transferred in 0.740 seconds.  Transfer rate 267.24 Kbytes/sec.    
                                                                     
                                                                               
> GET "2021042900039/PROD/GIMPAF.XML" "/u/smpe/smpnts/OSP08132/GIMPAF.XML" (REP
> ACE                                                                          
>>> TYPE I                                                                     
200 Type set to I.                                                              
                                        

        It says that TLSv1.2 is being used!!!
        I hope this helps.........
        
        Tony    


-----Original Message-----
From: IBM Mainframe Discussion List <[email protected]> On Behalf Of 
Dave Jousma
Sent: Tuesday, May 04, 2021 10:53 AM
To: [email protected]
Subject: SMPE Receive Order post May 1st

[[ SEI WARNING *** This email was sent from an external source. Do not open 
attachments or click on links from unknown or suspicious senders. *** ]]


Anyone ordering maintenance post May 1st using FTPs to download?   Here was the 
announcement:

As of May 1, 2021, to download files from IBM's secure delivery server using 
FTPS, it is necessary to enable TLS 1.2 in the z/OS Communications Server FTP 
client program. 

So, we've enabled ATTLS via PAGENT

TTLS Action:                  cAct4~TEC1_FTP_Client_Applicati   
  Version:                    3                                 
  Status:                     Active                            
  Scope:                      Connection                        
  HandshakeRole:              Client                            
  CtraceClearText:            Off                               
  Trace:                      2                                 
  TTLSConnectionAdvancedParms:                                  
   SecondaryMap:              On                                
   SSLv3:                     Off                               
   TLSv1:                     Off                               
   TLSv1.1:                   Off                               
   TLSv1.2:                   On                                
   TLSv1.3:                   On                                
   ApplicationControlled:     On                                
   CertificateLabel:          DigiCert Global Root CA           

Connection try fails on handshake.  Oddly, says TLSv1 from the IBM end.   

EZA1701I >>> AUTH TLS                                                           
     
SC3362 getReply: entered                                                        
     
SC4549 getNextReply: entered with waitForData = TRUE                            
     
234 SSLv23/TLSv1                                                                
     
SC4241 getLastReply: entered                                                    
     
FC3101 authServerAttls: entered                                                 
     
SC4405 getFNDELAY: entered                                                      
     
SC4440 setFNDELAY: entered                                                      
     
FC3140 authServerAttls: Start Handshake                                         
     
FC3149 authServerAttls: ioctl() failed on SIOCTTLSCTL - EDC8121I CONNECTION 
RESE     
T. (errno2=0x77A9733D)                                                          
     
SC4440 setFNDELAY: entered                                                      
     
EZA2897I Authentication negotiation failed                                      
     
SC4289 inSession: entered                                                       
     
EZA1534I *** Control connection with dispby-117.boulder.ibm.com dies.           
     
SC4332 SETCEC code = 10                                                         
     
SC3610 endSession: entered (sn=27733B18)                                        
     
SC2776 dataClose: entered                                                       
     
SC3693 endSession: recv() failed - EDC8121I CONNECTION RESET. 
(errno2=0x76650446     
)                                                                               
     

Its entirely possible that the PAGENT policy on our end is not correct, but its 
also not out of the realm of possibility that there are problems on IBM end and 
i why I am asking here if anyone else converted to TLSv1.2 as documented?

Thanks, Dave

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to