Fix LT19637 (expected to be published as LU19637) description mentions truncation of the parameter values entered in the System SSL configuration file (SYSconfigssl.cnf) when the parameter is longer than 255 bytes.
This article provides additional details. One possible error message caused by this problem would be:
XCOMM1510E ; SYSTEM SSL ; RC=402 ; REASON=NO SSL CIPHER SPECIFICATION
This problem was introduced by former fix LU07625 (REMOVE OPEN SSL AND ETPKI FROM XCOM ON Z/OS) which replaced the routines used to parse the SystemSSL config file.
CIPHERS is the most likely section to be affected by the problem, for example, if it specifies a list of individual fixes which takes more than 255 bytes. The cipher name which hits offset 255 plus any other cipher specified after it will not be passed to the partner during the TLS handshake.
When this happens, the handshake will fail for those partners that may only accept the cipher that has been excluded from the CLIENT_HELO message sent to the partner during the handshake. The message will be:
XCOMM1510E ; SYSTEM SSL ; RC=402 ; REASON=NO SSL CIPHER SPECIFICATION
It is possible to 'see' the SSL handshake by reproducing the error in a XCOMJOB TYPE=EXECUTE run with ,TRACE=YES added to the JCL parm. The XCOM trace will format the handshake messages exchanged with the partner, including the CLIENT_HELO (where the requestor proposes a list of ciphers), the SERVER_HELO (where the contacted server selects a cipher from the proposed list) or (in the case of RC 402) an alert returned by the server when it cannot accept any of the proposed ciphers.
Example of a working handshake:
14:42:37 8f6788 XCOMSSSL 7456 ======================================= SSL Record Begin =====================================
14:42:37 8f6788 XCOMSSSL 7882 Sending Handshake = <16> ( SSL3_RT_HANDSHAKE )
14:42:37 8f6788 XCOMSSSL 7888 SSL Version = <03.03> ( TLSv1.2 )
14:42:37 8f6788 XCOMSSSL 7896 Length = <0082> ( 130 )
14:42:37 8f6788 XCOMSSSL 5427 ==>Client_Hello Message = <01>
14:42:37 8f6788 XCOMSSSL 5434 Hello Buffer Length = <00007E> ( 126 )
14:42:37 8f6788 XCOMSSSL 5442 Client_Version = <03.03> ( TLSv1.2 )
14:42:37 8f6788 XCOMSSSL 5463 UTC Timestamp = <6995352D> ( Wed 2026-02-18 03:42:37 UTC )
14:42:37 8f6788 XCOMSSSL 5497 Random bytes = <random bytes>
14:42:37 8f6788 XCOMSSSL 5517 Session ID Length = <00> ( 0 )
14:42:37 8f6788 XCOMSSSL 5574 Session ID = <00> ( NULL )
14:42:37 8f6788 XCOMSSSL 5588 Supported Cipher Suites Len = <0010> ( 16 )
14:42:37 8f6788 XCOMSSSL 5597 Supported Cipher Suites = <00FF> ( TLS_EMPTY_RENEGOTIATION_INFO_SCSV )
14:42:37 8f6788 XCOMSSSL 5611 <C02C> ( TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 )
14:42:37 8f6788 XCOMSSSL 5611 <C030> ( TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 )
14:42:37 8f6788 XCOMSSSL 5611 <009F> ( TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 )
14:42:37 8f6788 XCOMSSSL 5611 <C02B> ( TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 )
14:42:37 8f6788 XCOMSSSL 5611 <C02F> ( TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 )
14:42:37 8f6788 XCOMSSSL 5611 <009E> ( TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 )
14:42:37 8f6788 XCOMSSSL 5611 <000A> ( TLS_RSA_WITH_3DES_EDE_CBC_SHA )
14:42:37 8f6788 XCOMSSSL 5626 Supported Compression Len = <01> ( 1 )
14:42:37 8f6788 XCOMSSSL 5631 Supported Compression = <00> ( NULL )
14:42:37 8f6788 XCOMSSSL 5658 Hello Extension Length = <0045> ( 69 )
14:42:37 8f6788 XCOMSSSL 5672 +Client_Hello Extension = <002B> ( Unknown Hello Extension )
14:42:37 8f6788 XCOMSSSL 7679 ======================================= SSL Record End =====================================
14:42:37 8f6788 XCOMSSSL 7456 ======================================= SSL Record Begin =====================================
14:42:37 8f6788 XCOMSSSL 7882 Received Handshake = <16> ( SSL3_RT_HANDSHAKE )
14:42:37 8f6788 XCOMSSSL 7888 SSL Version = <03.03> ( TLSv1.2 )
14:42:37 8f6788 XCOMSSSL 7896 Length = <0051> ( 81 )
14:42:37 8f6788 XCOMSSSL 6473 ==>Server_Hello Message = <02>
14:42:37 8f6788 XCOMSSSL 6480 Hello Buffer Length = <00004D> ( 77 )
14:42:37 8f6788 XCOMSSSL 6487 Server_Version = <03.03> ( TLSv1.2 )
14:42:37 8f6788 XCOMSSSL 6513 UTC Timestamp = <8755A816> ( ** Cannot Format ** )
14:42:37 8f6788 XCOMSSSL 6539 Random bytes = <random bytes>
14:42:37 8f6788 XCOMSSSL 6560 Session ID Length = <20> ( 32 )
14:42:37 8f6788 XCOMSSSL 6588 Session ID = <session ID>
14:42:37 8f6788 XCOMSSSL 6635 Selected Ciper Suite = <000A> ( TLS_RSA_WITH_3DES_EDE_CBC_SHA )
14:42:37 8f6788 XCOMSSSL 6646 Supported Compression = <00> ( NULL )
14:42:37 8f6788 XCOMSSSL 6669 Hello Extension Length = <0005> ( 5 )
14:42:37 8f6788 XCOMSSSL 6678 +Server_Hello Extension = <FF01> ( Renegotiation_Info )
14:42:37 8f6788 XCOMSSSL 6688 Renegotiation Info Length = <0001>
14:42:37 8f6788 XCOMSSSL 6730 Renegotiated Session ID = <00> ( NULL )
14:42:37 8f6788 XCOMSSSL 7817 ======================================= SSL Record End =====================================
Note how the partner accepts the very last cipher presented by the client (TLS_RSA_WITH_3DES_EDE_CBC_SHA)
Example of a failing handshake
14:52:54 8b6060 XCOMSSSL 7420 ======================================= SSL Record Begin ======================================
14:52:54 8b6060 XCOMSSSL 7901 Sending Handshake = <16> ( SSL3_RT_HANDSHAKE )
14:52:54 8b6060 XCOMSSSL 7907 SSL Version = <03.03> ( TLSv1.2 )
14:52:54 8b6060 XCOMSSSL 7915 Length = <0080> ( 128 )
14:52:54 8b6060 XCOMSSSL 4903 ==>Client_Hello Message = <01>
14:52:54 8b6060 XCOMSSSL 4910 Hello Buffer Length = <00007C> ( 124 )
14:52:54 8b6060 XCOMSSSL 4918 Client_Version = <03.03> ( TLSv1.2 )
14:52:54 8b6060 XCOMSSSL 4939 UTC Timestamp = <69953796> ( Wed 2026-02-18 03:52:54 UTC )
14:52:54 8b6060 XCOMSSSL 4973 Random bytes = <random bytes>
14:52:54 8b6060 XCOMSSSL 4993 Session ID Length = <00> ( 0 )
14:52:54 8b6060 XCOMSSSL 5050 Session ID = <00> ( NULL )
14:52:54 8b6060 XCOMSSSL 5064 Supported Cipher Suites Len = <000E> ( 14 )
14:52:54 8b6060 XCOMSSSL 5073 Supported Cipher Suites = <00FF> ( TLS_EMPTY_RENEGOTIATION_INFO_SCSV )
14:52:54 8b6060 XCOMSSSL 5087 <C02C> ( TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 )
14:52:54 8b6060 XCOMSSSL 5087 <C030> ( TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 )
14:52:54 8b6060 XCOMSSSL 5087 <009F> ( TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 )
14:52:54 8b6060 XCOMSSSL 5087 <C02B> ( TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 )
14:52:54 8b6060 XCOMSSSL 5087 <C02F> ( TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 )
14:52:54 8b6060 XCOMSSSL 5087 <009E> ( TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 )
14:52:54 8b6060 XCOMSSSL 5102 Supported Compression Len = <01> ( 1 )
14:52:54 8b6060 XCOMSSSL 5107 Supported Compression = <00> ( NULL )
14:52:54 8b6060 XCOMSSSL 5136 Hello Extension Length = <0045> ( 69 )
14:52:54 8b6060 XCOMSSSL 5150 +Client_Hello Extension = <002B> ( Supported_Versions )
14:52:54 8b6060 XCOMSSSL 5577 Supported_Versions Ext Len = <0007> ( 7 )
14:52:54 8b6060 XCOMSSSL 5586 Supported_Versions List len = <06> ( 6 )
14:52:54 8b6060 XCOMSSSL 5599 Supported_Versions = <03.03> ( TLSv1.2 )
14:52:54 8b6060 XCOMSSSL 5606 = <03.02> ( TLSv1.1 )
14:52:54 8b6060 XCOMSSSL 5606 = <03.01> ( TLSv1.0 )
14:52:54 8b6060 XCOMSSSL 5150 +Client_Hello Extension = <0017> ( Extended_Master_Secret )
14:52:54 8b6060 XCOMSSSL 5623 Extended Master Secret Len = <0000> ( 0 )
14:52:54 8b6060 XCOMSSSL 5150 +Client_Hello Extension = <000A> ( Elliptic_Curves )
14:52:54 8b6060 XCOMSSSL 5164 Elliptic Curve Ext Length = <000C> ( 12 )
14:52:54 8b6060 XCOMSSSL 5173 Elliptic Curve List Length = <000A> ( 10 )
14:52:54 8b6060 XCOMSSSL 5188 Elliptic Curve = <0015> ( secp224r1 )
14:52:54 8b6060 XCOMSSSL 5206 <0017> ( secp256r1 )
14:52:54 8b6060 XCOMSSSL 5206 <0018> ( secp384r1 )
14:52:54 8b6060 XCOMSSSL 5206 <0019> ( secp521r1 )
14:52:54 8b6060 XCOMSSSL 5206 <0013> ( secp192r1 )
14:52:54 8b6060 XCOMSSSL 5150 +Client_Hello Extension = <000B> ( EC_Point_Formats )
14:52:54 8b6060 XCOMSSSL 5224 EC Point Format Ext Length = <0002> ( 2 )
14:52:54 8b6060 XCOMSSSL 5233 EC Point Format List Length = <01> ( 1 )
14:52:54 8b6060 XCOMSSSL 5247 EC Point Format = <00> ( uncompressed )
14:52:54 8b6060 XCOMSSSL 5150 +Client_Hello Extension = <000D> ( Signature_Algorithm )
14:52:54 8b6060 XCOMSSSL 5282 Signature Algorithm Length = <001C> ( 28 )
14:52:54 8b6060 XCOMSSSL 5291 Signature Algorithm List Ln = <001A> ( 26 )
14:52:54 8b6060 XCOMSSSL 5307 Signature/Hash Algorithm = <06 / 01> ( SHA512 / RSA )
14:52:54 8b6060 XCOMSSSL 5330 <06 / 03> ( SHA512 / ECDSA )
14:52:54 8b6060 XCOMSSSL 5330 <05 / 01> ( SHA384 / RSA )
14:52:54 8b6060 XCOMSSSL 5330 <05 / 03> ( SHA384 / ECDSA )
14:52:54 8b6060 XCOMSSSL 5330 <04 / 01> ( SHA256 / RSA )
14:52:54 8b6060 XCOMSSSL 5330 <04 / 03> ( SHA256 / ECDSA )
14:52:54 8b6060 XCOMSSSL 5330 <04 / 02> ( SHA256 / DSA )
14:52:54 8b6060 XCOMSSSL 5330 <03 / 01> ( SHA224 / RSA )
14:52:54 8b6060 XCOMSSSL 5330 <03 / 03> ( SHA224 / ECDSA )
14:52:54 8b6060 XCOMSSSL 5330 <03 / 02> ( SHA224 / DSA )
14:52:54 8b6060 XCOMSSSL 5330 <02 / 01> ( SHA1 / RSA )
14:52:54 8b6060 XCOMSSSL 5330 <02 / 03> ( SHA1 / ECDSA )
14:52:54 8b6060 XCOMSSSL 5330 <02 / 02> ( SHA1 / DSA )
14:52:54 8b6060 XCOMSSSL 7664 ======================================= SSL Record End ======================================
14:52:54 8b6060 XCOMSSSL 7420 ======================================= SSL Record Begin ======================================
14:52:54 8b6060 XCOMSSSL 7901 Received Alert = <15> ( SSL3_RT_ALERT )
14:52:54 8b6060 XCOMSSSL 7907 SSL Version = <03.03> ( TLSv1.2 )
14:52:54 8b6060 XCOMSSSL 7915 Length = <0002> ( 2 )
14:52:54 8b6060 XCOMSSSL 7108 Alert_Level = <02> ( SSL3_AL_FATAL )
14:52:54 8b6060 XCOMSSSL 7112 Alert_Description = <28> ( SSL3_AD_HANDSHAKE_FAILURE )
14:52:54 8b6060 XCOMSSSL 7831 ======================================= SSL Record End ======================================
Note that TLS_RSA_WITH_3DES_EDE_CBC_SHA is missing from the "client hello" message which causes the partner to abort the handshake