By default, in this and previous releases an SSL/TLS client can trust a server which resides on an IP address that is not an intended connection target.
This trust is possible if the server has DNS aliases of the target name that is used as a Subject Alternate Name (SAN) or Common Name (CN) of the identification certificate that the server is using. This feature is deprecated and will be removed in a future release. To preserve backward compatibility this behavior has been maintained.
The ssl_only_verify_literally option enables you to restrict the certificate check to improve security. This stricter behavior can be enforced with global effect when specified as an CCI.INI option. Alternatively, you can use it as a specific application configuration. Specific application configuration is documented with the applications that support this option.
When using applications that do not yet support the configuration of this option the following CCI.INI setting can be used to override the applications behavior:
[ccitcp-base] ssl_only_verify_literally=[yes|true|no|false]
where:
The use of a controlled connection closure negotiation sequence enables you to close connections as an alternative to the typical socket linger options.
A controlled connection closure negotiation works in the following sequence:
This ensures the socket descriptor is valid until the conversation-closing handshake has completed. Alternatively, you can use a socket linger option.
You can use the close_negotiate_msecs option in the CCI.INI to specify the time to wait and control the preference of the controlled connection closure negotiation method versus the use of the socket linger method to close connections:
[ccitcp_base] close_negotiate_msecs=[yes|no|disabled|<n>]
where: