Guest

Preview Tool

Cisco Bug: CSCuq12291 - 7821/41 "host not found" intermittently accessing Corporate Directory

Last Modified

Feb 13, 2018

Products (4)

  • Cisco IP Phone 7800 Series
  • Cisco IP Phone 7841
  • Cisco IP Phone 7821
  • Cisco IP Phone 7861

Known Affected Releases

10.1(1) 10.1(1)SR1

Description (partial)

Symptom:
- 7821 and 7841 sometimes fails to get the corporate directory giving eventually host not found. 
-This happens randomly.
- After resetting the phone solves the issue.
- Phone Firmware Used sip78xx.10-1-1-9 and sip78xx.10-1-1SR1-4.
- Affected phones are connected over LAN and WAN.

Conditions:
Console Logs: 

5730 NOT 10:18:58.897858 JAVA: HTTP JNI| processHttpRequest: sending http request out..., url: https://10.113.52.5:8443/ccmcip/xmldirectoryinput.jsp?name=SEPA80C0DA84127 
5731 NOT 10:18:58.897898 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
5732 NOT 10:18:58.899019 JAVA: HTTP JNI| Curl_do_perform: enter 
5733 NOT 10:18:58.899108 JAVA: HTTP JNI| connect_host: enter 
5734 NOT 10:18:58.899149 JAVA: HTTP JNI| Curl_connect: enter 
5735 NOT 10:18:58.899188 NETSD-netsdDhcp6Get(): que = /tmp/dhcp6_get_msg_que64 
5736 NOT 10:18:58.900458 JAVA: HTTP JNI| Curl_setup_conn: enter 
5737 NOT 10:18:58.900559 JAVA: HTTP JNI| singleipconnect: enter 
5738 NOT 10:18:58.900831 JAVA: HTTP JNI| sockoptCallback: succesfully setsockopt IP_TOS=0 
5739 NOT 10:18:58.900906 JAVA: HTTP JNI| singleipconnect: skip the bind/connect since it's SSL 
5740 NOT 10:18:58.900949 JAVA: HTTP JNI| Curl_connecthost: return from singleipconnect, result=0 
5741 NOT 10:18:58.900990 JAVA: HTTP JNI| ConnectPlease: return from Curl_connecthost, result=0 
5742 NOT 10:18:58.901030 JAVA: HTTP JNI| Curl_setup_conn: return from ConnectPlease, result=0 
5743 NOT 10:18:58.901069 JAVA: HTTP JNI| Curl_http_connect: enter 
5744 NOT 10:18:58.901122 JAVA: HTTP JNI| Curl_ssl_secd_connect: enter 
5745 ERR 10:18:58.901162 JAVA: Sec SSL initialization - duplicate initialization request 
5746 NOT 10:18:58.901202 JAVA: HTTP JNI| Curl_ssl_secd_connect: initializing default SSL context 
5747 NOT 10:18:58.901243 JAVA: HTTP JNI| Curl_ssl_secd_connect: ip=10.113.52.5, port=8443 
5748 NOT 10:18:58.901282 JAVA: HTTP JNI| Curl_ssl_secd_connect: ip_mode=0 
5749 NOT 10:18:58.901321 JAVA: HTTP JNI| Curl_ssl_secd_connect: before secSSLConnect 
5750 DEB 10:18:58.901359 JAVA: Sec SSL Connection - After bind. 
5751 INF 10:18:58.902366 JAVA: Sec SSL Connection - HTTPS_TLS. 
5752 INF 10:18:58.902451 JAVA: SSL session setup - Requesting Cert 
5753 NOT 10:18:58.902514 JAVA: HTTP JNI| getActiveCertificateData: Invoking sec_get_activeCert API 
5754 NOT 10:18:58.902557 SECUREAPP-REQ_TBL_FULL: Failed, req tbl full 
5755 NOT 10:18:58.902595 SECUREAPP-REQ_TOO_MNY_ACTV: Failed, too many active requests 
5756 NOT 10:18:58.902633 SECUREAPP-REQ_RJCT_RSPNS: Sending reject response 
5757 NOT 10:18:58.917582 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
5758 NOT 10:18:58.938010 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
5759 ERR 10:18:58.953933 JAVA: HTTP JNI| getActiveCertificateData: get cert failed?! 
5760 INF 10:18:58.954054 JAVA: SSL session setup - Get Active cert ok 
5761 DEB 10:18:58.954099 JAVA: SSL session setup - cert len=0, type=LSC 
5762 ERR 10:18:58.954141 JAVA: SSL session setup - Failed to decode X509 certificate 
5763 DEB 10:18:58.954215 JAVA: Sec SSL Connection - check status & perform handshake. 
5764 DEB 10:18:58.954258 JAVA: Sec SSL Connection - handshake done or in progress. 
5765 NOT 10:18:58.954301 JAVA: HTTP JNI| Curl_ssl_secd_connect: after secSSLConnect, handle=9206664 
5766 DEB 10:18:58.954340 JAVA: Sec SSL Connection - check status & perform handshake. 
5773 DEB 10:18:59.056203 JAVA: SSL session setup Cert Verification - Role is = 7 
5774 INF 10:18:59.056251 JAVA: SSL session setup Cert Verification - Invoking certificate validation helper plugin. 
5775 NOT 10:18:59.056291 SECUREAPP-REQ_TBL_FULL: Failed, req tbl full 
5776 NOT 10:18:59.056329 SECUREAPP-REQ_TOO_MNY_ACTV: Failed, too many active requests 
5777 NOT 10:18:59.056367 SECUREAPP-REQ_RJCT_RSPNS: Sending reject response 
5778 NOT 10:18:59.061540 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
5781 INF 10:18:59.109483 JAVA: SSL session setup Cert Verification - Certificate validation helper plugin returned. 
5782 ERR 10:18:59.109640 JAVA: SSL session setup Cert Verification - Certificate is invalid. 
5783 DEB 10:18:59.109690 JAVA: SSL session setup Cert Verification - returning validation result = 0 
5784 ERR 10:18:59.109734 JAVA: Sec SSL Connection - Handshake failed. 
5785 DEB 10:18:59.109774 JAVA: SSL shutdown. 
5786 DEB 10:18:59.109812 JAVA: BIO reset. 
5787 DEB 10:18:59.109850 JAVA: SSL free. 
5788 DEB 10:18:59.109887 JAVA: Closing socket. 
5789 NOT 10:18:59.109925 JAVA: Sec SSL Close Connection successful. 

From the Debug logs: 

1854 NOT 16:32:10.827803 JAVA: HTTP JNI| processHttpRequest: sending http request out..., url: https://10.113.52.5:8443/ccmcip/xmldirectoryinput.jsp?name=SEPA80C0DA85317 
1855 NOT 16:32:10.827868 JAVA: HTTP JNI| Curl_do_perform: enter 
1856 NOT 16:32:10.827912 JAVA: HTTP JNI| connect_host: enter 
1857 NOT 16:32:10.827951 JAVA: HTTP JNI| Curl_connect: enter 
1858 DEB 16:32:10.845009 JAVA: HTTP JNI| makeRequest: exit 
1859 DEB 16:32:10.846278 JAVA: HTTP JNI| createJavaSafeConId: conId:0 -> safeConId:0xc00 
1860 DEB 16:32:10.847016 JAVA: HTTP JNI| Java_cip_http_NativeHttpTask_makeRequest: exit 
1861 NOT 16:32:10.847268 NETSD-netsdDhcp6Get(): que = /tmp/dhcp6_get_msg_que64 
1862 NOT 16:32:10.847415 JAVA: HTTP JNI| Curl_setup_conn: enter 
1863 NOT 16:32:10.847542 JAVA: HTTP JNI| singleipconnect: enter 
1864 DEB 16:32:10.847668 JAVA: HTTP JNI| sockoptCallback: enter 
1865 NOT 16:32:10.848149 JAVA: HTTP JNI| sockoptCallback: succesfully setsockopt IP_TOS=0 
1866 DEB 16:32:10.848417 JAVA: HTTP JNI| sockoptCallback: exit 
1867 NOT 16:32:10.848559 JAVA: HTTP JNI| singleipconnect: skip the bind/connect since it's SSL 
1868 NOT 16:32:10.848842 JAVA: HTTP JNI| Curl_connecthost: return from singleipconnect, result=0 
1869 NOT 16:32:10.848982 JAVA: HTTP JNI| ConnectPlease: return from Curl_connecthost, result=0 
1870 NOT 16:32:10.849477 JAVA: HTTP JNI| Curl_setup_conn: return from ConnectPlease, result=0 
1871 NOT 16:32:10.851826 JAVA: HTTP JNI| Curl_http_connect: enter 
1872 NOT 16:32:10.852005 JAVA: HTTP JNI| Curl_ssl_secd_connect: enter 
1873 ERR 16:32:10.853494 JAVA: Sec SSL initialization - duplicate initialization request 
1874 NOT 16:32:10.853728 JAVA: HTTP JNI| Curl_ssl_secd_connect: initializing default SSL context 
1875 NOT 16:32:10.853880 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
1876 NOT 16:32:10.855214 JAVA: HTTP JNI| Curl_ssl_secd_connect: ip=10.113.52.5, port=8443 
1877 NOT 16:32:10.855336 JAVA: HTTP JNI| Curl_ssl_secd_connect: ip_mode=0 
1878 NOT 16:32:10.855592 JAVA: HTTP JNI| Curl_ssl_secd_connect: before secSSLConnect 
1879 DEB 16:32:10.855637 JAVA: Sec SSL Connection - After bind. 
1880 INF 16:32:10.857411 JAVA: Sec SSL Connection - HTTPS_TLS. 
1881 INF 16:32:10.857532 JAVA: SSL session setup - Requesting Cert 
1882 NOT 16:32:10.857584 JAVA: HTTP JNI| getActiveCertificateData: Invoking sec_get_activeCert API 
1883 NOT 16:32:10.865899 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
1884 NOT 16:32:10.887120 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
1885 NOT 16:32:10.911481 JAVA: HTTP JNI| getActiveCertificateData: 
1886 INF 16:32:10.911654 JAVA: SSL session setup - Get Active cert ok 
1887 DEB 16:32:10.911709 JAVA: SSL session setup - cert len=1160, type=MIC 
1888 DEB 16:32:10.911755 JAVA: Certificate subject name = /serialNumber=PID:CP-7841 SN:WZP174800NE/O=Cisco Systems Inc./OU=VTG/CN=CP-7841-SEPA80C0DA85317 
1889 DEB 16:32:10.911799 JAVA: SSL session setup - Certificate issuer name = /O=Cisco Systems/CN=Cisco Manufacturing CA 
1890 INF 16:32:10.911841 JAVA: Returning RSA sec SSL private encrypt/decrypt method 
1891 DEB 16:32:10.911882 JAVA: SSL session setup - changed default RSA method. 
1892 INF 16:32:10.911922 JAVA: Setup SSL session - SSL use certificate okay 
1893 INF 16:32:10.911962 JAVA: Setup SSL session - SSL use private key okay 
1894 DEB 16:32:10.912003 JAVA: Sec SSL Connection - check status & perform handshake. 
1895 DEB 16:32:10.914911 JAVA: Sec SSL Connection - handshake done or in progress. 
1896 NOT 16:32:10.915985 SECUREAPP-Sec SSL Connection - check status & perform handshake. 
1897 NOT 16:32:10.916630 JAVA: HTTP JNI| Curl_ssl_secd_connect: after secSSLConnect, handle=3890776 
1898 DEB 16:32:10.917189 JAVA: Sec SSL Connection - check status & perform handshake. 
1899 DEB 16:32:10.919017 JAVA: SSL session setup Cert Verification - Role is = 7 
1900 INF 16:32:10.923364 JAVA: SSL session setup Cert Verification - Invoking certificate validation helper plugin. 
1901 NOT 16:32:10.927300 SECUREAPP-No match found in trust list against the item 
1902 NOT 16:32:10.928077 SECUREAPP-Using TVS for cert validation 
- After two Minutes The phone connection to the TVS fails: 

Line 18754: 7773 NOT 16:34:11.025488 SECUREAPP-REQ_TO_ABORT: Req timeout, aborting 
Line 18756: 7774 NOT 16:34:11.026441 SECUREAPP-REQ_ABORT_THREAD: Aborting req thread, tid [1123177584], clnt[/tmp/secClnt_pid_2089_34226284] 
Line 18758: 7775 NOT 16:34:11.027075 SECUREAPP-REQ_REASON_CODE: Reason code:[1]([INTERNAL]) subcode:[7]([TIMEOUT]) 
Line 18760: 7776 NOT 16:34:11.027746 SECUREAPP-REQ_CANT_CANCEL: Unable to cancel req thread, tid [1123177584]

Related Community Discussions

<key>CSCuq12291</key> - 7821/41 &quot;host not found&quot; intermittently accessing Corporate Directory
This bug states that 10.2 (1.12) is a know fixed firmware release.  Then why is it still happening to my customer that has this exact firmware on all of their 78xx phones? 
Latest activity: Jan 28, 2016
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.