Try OpenEdge Now
skip to main content
Programming Interfaces
External Program Interfaces : Sockets : Implementing ABL socket security : Invoking socket operations for SSL sessions : Deadlocking when a non-SSL client socket connects to an SSL server socket
 
Deadlocking when a non-SSL client socket connects to an SSL server socket
When you open a non-SSL connection from an ABL client to an ABL SSL server, you can initiate a situation that can result in an deadlock condition that is unbreakable from with in the application. This condition results from the following sequence of events:
1. The non-SSL ABL client connects a socket to a server socket on an ABL server using the CONNECT() method.
2. The client immediately follows the CONNECT() method by a READ() method on the socket object.
3. The ABL server enables SSL connections using the ENABLE-CONNECTIONS() method.
4. The server immediately follows the ENABLE-CONNECTIONS() method by a WRITE() method on the server socket object.
After Step 2, the non-SSL client begins waiting for the socket server to send it data. After Step 4, the socket server waits in a read mode (despite the WRITE()) for the client to begin an SSL connection operation. This results in both ABL sessions waiting for data from the other. For both the ABL client and server, the application hangs because ABL does not provide a socket timeout feature.
There is no way to detect this situation once the deadlock has occurred. However, the basic strategy for handling it is to know ahead of time that the server is running an SSL session. You can use the following techniques to determine the state of the server before continuing from the client:
*On the ABL socket server, use the SET-CONNECT-PROCEDURE() method to handle a CONNECT event asynchronously and watch a manual timer to determine if the ABL socket server is hanging.
*On the client side, you can also use a small procedure to test the connection before continuing with running the application.