SSL/TLS/^SJMSEC, firmware and release notes for EHS6 | Telit Cinterion IoT Developer Community
February 1, 2017 - 10:38am, 2995 views
(I was going to move this to be a follow up to "Breaking Java Security"
with a firmware update, but have moved it back because this really
isn't related to "updating")
I'm trying to get SSL/TLS working on an EHS6. The SJMSEC command fails
with "unknown" (see below). I think this means that this version of firmware
doesn't have that command/functionality in it.
It'd be nice to have access to firmware release notes so as to "go back in
time" and confirm such suspicions.
Otherwise (or if not), have any suggestions for how to resolve this?
^SYSLOADING
+PBREADY
^SYSINFO: 200
ati1
Cinterion
EHS6
REVISION 02.000
A-REVISION 00.000.15
OK
at^sjmsec=?
ERROR
at+cmee=2
OK
at^sjmsec?
+CME ERROR: Unknown
at^scfg?
^SCFG: "Call/ECC","0"
^SCFG: "Gpio/mode/ASC1","gpio"
^SCFG: "Gpio/mode/DAI","gpio"
^SCFG: "Gpio/mode/DCD0","std"
^SCFG: "Gpio/mode/DSR0","std"
^SCFG: "Gpio/mode/DTR0","std"
^SCFG: "Gpio/mode/FSR","gpio"
^SCFG: "Gpio/mode/HSIC","gpio"
^SCFG: "Gpio/mode/PULSE","gpio"
^SCFG: "Gpio/mode/PWM","gpio"
^SCFG: "Gpio/mode/RING0","std"
^SCFG: "Gpio/mode/SPI","rsv"
^SCFG: "Gpio/mode/SYNC","gpio"
^SCFG: "GPRS/AutoAttach","enabled"
^SCFG: "Ident/Manufacturer","Cinterion"
^SCFG: "Ident/Product","EHS6"
^SCFG: "MEopMode/SoR","off"
^SCFG: "MEShutdown/Fso","0"
^SCFG: "Radio/Band","511"
^SCFG: "Radio/OutputPowerReduction","4"
^SCFG: "Serial/Interface/Allocation","1","1"
^SCFG: "Serial/USB/DDD","0","0","0409","1E2D","0058","Cinterion Wireless Modules","EHx",""
^SCFG: "Tcp/IRT","3"
^SCFG: "Tcp/MR","10"
^SCFG: "Tcp/OT","6000"
^SCFG: "Tcp/WithURCs","on"
^SCFG: "Trace/Syslog/Otap","0"
^SCFG: "Userware/Autostart","1"
^SCFG: "Userware/Autostart/Delay","0"
^SCFG: "Userware/DebugInterface","0.0.0.0","0.0.0.0","0"
^SCFG: "Userware/DebugMode","on"
^SCFG: "Userware/Passwd",
^SCFG: "Userware/Stdout","asc1",,,,"off"
^SCFG: "Userware/Watchdog","1"
OK
Hello,
Here's what the AT commands specification says about ^SYSINFO: 200:
"URC will be send 40 seconds after system-up when the JRC midlet was not tried to start (no autostart, no midlet at all, whatever). Used to see in logs, that midlet is not running, as example."
JRC is a special factory MIDlet which is installed in all EHS6 modules. A part of the AT commands is implemented in this MIDlet. It is started automatically each time the module boots (if the global autostart is not disabled). As in your case the autostart is enabled (^SCFG: "Userware/Autostart","1") I suspect that the JRC might have been uninstalled - please check with AT^SJAM=4 if it's installed.
Regards,
Bartłomiej
Thanks for your help! the command returns:
at^sjam=4
^SJAM: "a:/Comms.jad","Comms MIDlet Suite","MIDlet Suite Vendor","1.0.0",0,6730,0
OK
I can't find any documentation (boy, there's a TON of it) describing how to
install/re-install the JRC.
Could you give me a reference for how to recover from
this state/condition?
Alternatively, could I disable autostart (AT^SCFG="Userware/Autostart","0")
and then upload the CERTS/CREDS for SSL/TLS?
Thanks for your help!
Tschuss!
-U4-
Hello,
You can install JRC like the regular MIDlet - but you need to have the right version for your firmware. Or you can do the firmware update with gWinSwup and it will also install the JRC.
Disabling autostart will not help - you need to have the JRC installed and the autostart activated so that the JRC would be started each time automatically. Then the module will have the full functionality.
Do you have the JRC or firmware to load to the module?
Regards,
Bartłomiej
>>
>> Do you have the JRC or firmware to load
>>
No, I don't have the firmware/MIDlet.
Is it available on-line?
Thanks, Mr. B!
Please check your email.
Regards,
Bartłomiej