EG916Q-GL AT+QSSLOPEN Always Returns Error 579
Module Information
-
Module: EG916Q-GL
-
Firmware: EG916QGLLGR01A05M04_A0.300.A0.300
-
SIM: 1NCE IoT (ICCID: 89882280666142019797, IMSI: 901405114201979)
-
Network: Roaming (stat=5), RSSI=19 (-75 dBm)
-
Host MCU: ESP32-S3, communicating via UART AT commands at 115200 baud
Problem Description
AT+QSSLOPEN returns error code 579 for every TLS/SSL connection attempt. This error occurs regardless of:
-
Target server (www.google.com:443, custom AWS IoT endpoint on port 8883)
-
Security level (seclevel=0, 1, or 2)
-
SSL context (ctx 0 with certificates configured, ctx 1 completely clean/default)
-
SSL version (sslversion=3 for TLS 1.2 only, sslversion=4 for all)
-
Cipher suite (0xFFFF for all, 0x003C for specific)
-
Certificate configuration (mTLS with CA+cert+key, server-auth only, or NO certificates at all)
Raw TCP connections via AT+QIOPEN work correctly to the same servers and ports. The SSL/TLS functionality appears completely non-functional.
AT+QIGETERROR always reports +QIGETERROR: 0,operate successfully after each SSL failure, providing no useful diagnostic information.
AT+QMTOPEN with AT+QMTCFG="ssl" enabled also fails with result=5 (network connection error), consistent with the same broken TLS stack.
Error 579 is not documented in the Quectel AT Commands Manual for this module family (documented SSL error codes end at 574).
Network Environment
AT+QIACT?
+QIACT: 1,1,1,"100.76.161.65"
AT+QIDNSCFG=1
+QIDNSCFG: 1,"8.8.8.8","8.8.4.4"
AT+CCLK?
+CCLK: "26/02/18,20:33:17+00"
AT+QSSLOPEN=?
+QSSLOPEN: (1-15),(0-5),(0-11),<serveraddr>,<server_port>[,(0-2)]
Minimal Reproduction Steps
Step 1: Confirm TCP connectivity works
AT+QIOPEN=1,11,"TCP","www.google.com",443,0,0
OK
+QIOPEN: 11,0 <-- SUCCESS: TCP connection established
AT+QICLOSE=11
OK
Step 2: Configure a minimal SSL context (NO certificates, NO validation)
AT+QSSLCFG="sslversion",1,4
OK
AT+QSSLCFG="seclevel",1,0
OK
AT+QSSLCFG="ciphersuite",1,0xFFFF
OK
AT+QSSLCFG="sni",1,1
OK
Step 3: Verify the SSL context is clean (no certificate references)
AT+QSSLCFG="sslversion",1
+QSSLCFG: "sslversion",1,4
AT+QSSLCFG="seclevel",1
+QSSLCFG: "seclevel",1,0
AT+QSSLCFG="ciphersuite",1
+QSSLCFG: "ciphersuite",1,0XFFFF
AT+QSSLCFG="cacert",1
OK <-- Empty, no CA certificate
AT+QSSLCFG="clientcert",1
OK <-- Empty, no client certificate
AT+QSSLCFG="clientkey",1
OK <-- Empty, no client key
AT+QSSLCFG="sni",1
+QSSLCFG: "sni",1,1
Step 4: Attempt TLS connection
AT+QSSLOPEN=1,1,0,"www.google.com",443,0
OK
+QSSLOPEN: 0,579 <-- FAIL: Error 579 (undocumented)
AT+QIGETERROR
+QIGETERROR: 0,operate successfully <-- No useful error info
Step 5: For comparison, TCP to same server succeeds
AT+QIOPEN=1,11,"TCP","www.google.com",443,0,0
OK
+QIOPEN: 11,0 <-- SUCCESS
AT+QICLOSE=11
Complete Test Matrix (all fail with error 579)
| Test | seclevel | Target | SSL ctx | Certs | sslversion | ciphersuite | Result |
|------|----------|--------|---------|-------|------------|-------------|--------|
| 1 | 2 (mTLS) | AWS IoT:8883 | 0 | CA + cert + key | 3 | 0xFFFF | 579 |
| 2 | 2 (mTLS) | AWS IoT:8883 | 0 | AmazonRootCA1 only | 3 | 0xFFFF | 579 |
| 3 | 2 (mTLS) | AWS IoT:8883 | 0 | Starfield G2 only | 3 | 0xFFFF | 579 |
| 4 | 0 (none) | www.google.com:443 | 0 | client cert/key in ctx | 4 | 0xFFFF | 579 |
| 5 | 0 (none) | AWS IoT:8883 | 0 | client cert/key in ctx | 4 | 0xFFFF | 579 |
| 6 | 1 (server) | AWS IoT:8883 | 0 | AmazonRootCA1 | 4 | 0xFFFF | 579 |
| 7 | 0 (none) | www.google.com:443 | 1 (clean) | None at all | 4 | 0xFFFF | 579 |
| 8 | 0 (none) | www.google.com:443 | 1 (clean) | None at all | 3 | 0xFFFF | 579 |
Test 7 is the most significant: a completely clean SSL context with zero certificates, zero validation (seclevel=0), attempting to connect to www.google.com:443 — still returns error 579.
Independent Verification
We verified from a PC on the same network that the AWS IoT endpoint’s TLS chain validates correctly:
$ openssl s_client -connect a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 -CAfile AmazonRootCA1.pem
...
Verify return code: 0 (ok)
Protocol: TLSv1.2
Cipher: ECDHE-RSA-AES128-GCM-SHA256
The server certificate chain and CA certificates are not the issue.
Certificate File Storage
Certificates are uploaded via AT+QFUPL and confirmed present:
AT+QFLST="*"
+QFLST: "UFS:ca.pem",2612
+QFLST: "UFS:client.key",1679
+QFLST: "UFS:client.pem",1220
Note: AT+QFLST shows files with "UFS:" prefix, but AT+QSSLCFG stores paths without prefix (e.g., "ca.pem"). We also confirmed AT+QSECWRITE is not supported on this firmware (returns ERROR).
Questions
-
What does error code 579 mean? It is not in the documented error code range (ends at 574).
-
Is there a known issue with SSL/TLS on this firmware version (EG916QGLLGR01A05M04)?
-
Is there a newer firmware available for the EG916Q-GL that we should test?
-
Should certificate file paths use the
"UFS:"prefix inAT+QSSLCFGcommands? -
Does
AT+QMTOPENwith SSL use the same internal TLS stack asAT+QSSLOPEN? -
Are there any additional
AT+QSSLCFGparameters we should set that are required for TLS to function? We noticed the module supportsnegotiatetime,ignoreinvalidcertsign,renegotiation,alpn— could any default values prevent TLS from working?
Attached: Full Boot Log
I (1253) MODEM: Modem UART1 init (TX:13 RX:12 @ 115200 baud)
I (1263) MODEM: Powering on modem (PWRKEY pulse)…
I (2463) MODEM: Modem STATUS is ON
I (8483) MODEM: Modem ID:
Quectel
EG916Q-GL
Revision: EG916QGLLGR01A05M04
OK
I (8983) MODEM: SIM ready
I (9483) MODEM: SIM ICCID: 89882280666142019797
I (9983) MODEM: SIM IMSI: 901405114201979
I (9983) MODEM: Carrier detected: 1NCE | Auto-APN: ‘iot.1nce.net’
I (9983) MODEM: Waiting for network registration…
I (10493) MODEM: Network registered (stat=5, roaming)
I (10993) MAIN_APP: LTE signal: RSSI=19 (-75 dBm)
I (10993) MODEM: Activating PDP with APN: ‘iot.1nce.net’ (carrier: 1NCE)
I (11523) MODEM: 3GPP PDP before config:
+CGDCONT: 1,“IP”,“iot.1nce.net”,“0.0.0.0”,0,0,0,0
OK
I (12553) MODEM: 3GPP PDP after config:
+CGDCONT: 1,“IP”,“iot.1nce.net”,“0.0.0.0”,0,0,0,0
OK
I (13053) MODEM: 3GPP PDP activation state:
+CGACT: 1,1
OK
I (16373) MODEM: PDP context:
+QIACT: 1,1,1,“100.76.161.65”
OK
I (16883) MODEM: Active DNS servers:
+QIDNSCFG: 1,“8.8.8.8”,“8.8.4.4”
OK
I (16883) MODEM: PDP active — waiting 3s for data path to stabilize…
I (19883) MAIN_APP: LTE modem ready
I (19883) MAIN_APP: LTE ready — starting MQTT
I (19883) APP_MQTT: Starting MQTT on LTE transport
I (19883) MQTT_LTE: Starting LTE MQTT connection (broker=‘mqtts://a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com’ port=8883)…
I (19893) APP_NVS: Attempting to load credentials from NVS…
I (19903) APP_NVS: Loaded ‘aws_root_ca’ (len=2612)
I (19903) APP_NVS: Loaded ‘aws_cert’ (len=1220)
I (24573) MQTT_LTE: Credentials uploaded to modem UFS
I (25143) MQTT_LTE: Modem files:
+QFLST: “UFS:ca.pem”,2612
+QFLST: “UFS:client.key”,1679
+QFLST: “UFS:client.pem”,1220
OK
I (25653) MODEM: Modem time:
+CCLK: “26/02/18,20:49:46+00”
OK
I (29653) MODEM: SSL context 0 configured for mTLS — reading back config:
I (30153) MODEM: sslversion:
+QSSLCFG: “sslversion”,0,3
OK
I (30663) MODEM: ciphersuite:
+QSSLCFG: “ciphersuite”,0,0XFFFF
OK
I (31163) MODEM: seclevel:
+QSSLCFG: “seclevel”,0,2
OK
I (31663) MODEM: cacert:
+QSSLCFG: “cacert”,0,“ca.pem”
OK
I (32173) MODEM: clientcert:
+QSSLCFG: “clientcert”,0,“client.pem”
OK
I (32683) MODEM: clientkey:
+QSSLCFG: “clientkey”,0,“client.key”
OK
I (33183) MODEM: sni:
+QSSLCFG: “sni”,0,1
OK
I (33693) MODEM: ignorelocaltime:
+QSSLCFG: “ignorelocaltime”,0,1
OK
I (34193) MODEM_MQTT: MQTT bound to PDP context 1
I (36193) MODEM_MQTT: MQTT SSL enabled (ctx 0)
I (36193) MQTT_LTE: === LTE TLS Diagnostic ===
I (36693) MQTT_LTE: Modem firmware:
EG916QGLLGR01A05M04_A0.300.A0.300
OK
W (36793) MODEM: Response buffer full (1023 bytes)
W (36793) MODEM: AT timeout. Partial RX (1023 bytes):
+QSSLCFG: “sslversion”,(0-5),(0-5)
+QSSLCFG: “dtls”,(0-5),(0,1)
+QSSLCFG: “ciphersuite”,(0-5),(0X0035,0X002F,0X0005,0X0004,0
W (36803) MQTT_LTE: QSSLCFG=? failed or truncated. Partial:
+QSSLCFG: “sslversion”,(0-5),(0-5)
+QSSLCFG: “dtls”,(0-5),(0,1)
+QSSLCFG: “ciphersuite”,(0-5),(0X0035,0X002F,0X0005,0X0004,0X000A,0X003D,0XC002,0XC003,0XC004,0XC005,0XC007,0XC008,0XC009,0XC00A,0XC011,0XC012,0XC013,0XC014,0XC00C,0XC00D,0XC00E,0XC00F,0XC023,0XC024,0XC025,0XC026,0XC027,0XC028,0XC029,0XC02A,0XC02F,0XC030,0XFFFF)
+QSSLCFG: “seclevel”,(0-5),(0-2)
+QSSLCFG: “cacert”,(0-5),
+QSSLCFG: “clientcert”,(0-5),<client_cert_path>
+QSSLCFG: “clientkey”,(0-5),<client_key_path>,<key_pwd>
+QSSLCFG: “sni”,(0-5),(0,1)
+QSSLCFG: “ignorelocaltime”,(0-5),(0,1)
+QSSLCFG: “negotiatetime”,(0-5),(10-150)
+QSSLCFG: “ignoreinvalidcertsign”,(0-5),(0,1)
+QSSLCFG: “ignorecertitem”,(0-5),(0-1048575)
+QSSLCFG: “ignoremulticertchainverify”,(0-5),(0,1)
+QSSLCFG: “session_cache”,(0-5),(0,1)
+QSSLCFG: “dtlsversion”,(0-5),(0,1)
+QSSLCFG: “psk_enable”,(0-5),(0,1)
+QSSLCFG: “psk”,(0-5),,
+QSSLCFG: “renegotiation”,(0-5),(0,1)
+QSSLCFG: “closetimemode”,(0-5),(0,1)
+QSSLCFG: “alpn”,(0-5),<p
I (37903) MQTT_LTE: QSSLOPEN syntax:
+QSSLOPEN: (1-15),(0-5),(0-11),,<server_port>[,(0-2)]
OK
I (38403) MQTT_LTE: Step 1: Testing raw TCP to broker a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 …
I (39403) MODEM: TCP test: opening connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
I (41503) MODEM: Resolved a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com → 56.137.44.180 (via QISTATE)
I (42003) MODEM: TCP test SUCCESS: connected to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
I (42003) MQTT_LTE: *** RAW TCP OK (a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com → 56.137.44.180:8883) ***
I (42003) MQTT_LTE: Step 2: Testing mTLS via QSSLOPEN to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 (seclevel=2)…
I (43023) MODEM: SSL test: opening TLS connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 (ssl_ctx=0)
E (45203) MODEM: SSL test FAILED (err=579) to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
E (45703) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (45703) MQTT_LTE: *** mTLS FAILED with CA bundle — testing individual CAs ***
I (45703) APP_NVS: Attempting to load credentials from NVS…
I (45713) APP_NVS: Loaded ‘aws_root_ca’ (len=2612)
I (45713) APP_NVS: Loaded ‘aws_cert’ (len=1220)
I (45723) MQTT_LTE: CA bundle contains 2 cert(s), testing each individually:
I (45723) MQTT_LTE: Testing CA: CA[0] (AmazonRootCA1) (1188 bytes)…
I (47733) MODEM: Modem time:
+CCLK: “26/02/18,20:50:08+00”
OK
I (51733) MODEM: SSL context 0 configured for mTLS — reading back config:
I (52233) MODEM: sslversion:
+QSSLCFG: “sslversion”,0,3
OK
I (52743) MODEM: ciphersuite:
+QSSLCFG: “ciphersuite”,0,0XFFFF
OK
I (53243) MODEM: seclevel:
+QSSLCFG: “seclevel”,0,2
OK
I (53743) MODEM: cacert:
+QSSLCFG: “cacert”,0,“ca.pem”
OK
I (54253) MODEM: clientcert:
+QSSLCFG: “clientcert”,0,“client.pem”
OK
I (54763) MODEM: clientkey:
+QSSLCFG: “clientkey”,0,“client.key”
OK
I (55263) MODEM: sni:
+QSSLCFG: “sni”,0,1
OK
I (55773) MODEM: ignorelocaltime:
+QSSLCFG: “ignorelocaltime”,0,1
OK
I (56773) MODEM: SSL test: opening TLS connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 (ssl_ctx=0)
E (59013) MODEM: SSL test FAILED (err=579) to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
E (59513) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (59513) MQTT_LTE: *** CA[0] (AmazonRootCA1): TLS FAILED ***
I (59513) MQTT_LTE: Testing CA: CA[1] (Starfield G2) (1424 bytes)…
I (61533) MODEM: Modem time:
+CCLK: “26/02/18,20:50:22+00”
OK
I (65543) MODEM: SSL context 0 configured for mTLS — reading back config:
I (66043) MODEM: sslversion:
+QSSLCFG: “sslversion”,0,3
OK
I (66553) MODEM: ciphersuite:
+QSSLCFG: “ciphersuite”,0,0XFFFF
OK
I (67053) MODEM: seclevel:
+QSSLCFG: “seclevel”,0,2
OK
I (67553) MODEM: cacert:
+QSSLCFG: “cacert”,0,“ca.pem”
OK
I (68063) MODEM: clientcert:
+QSSLCFG: “clientcert”,0,“client.pem”
OK
I (68573) MODEM: clientkey:
+QSSLCFG: “clientkey”,0,“client.key”
OK
I (69073) MODEM: sni:
+QSSLCFG: “sni”,0,1
OK
I (69583) MODEM: ignorelocaltime:
+QSSLCFG: “ignorelocaltime”,0,1
OK
I (70583) MODEM: SSL test: opening TLS connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 (ssl_ctx=0)
E (72823) MODEM: SSL test FAILED (err=579) to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
E (73323) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (73323) MQTT_LTE: *** CA[1] (Starfield G2): TLS FAILED ***
E (73323) MQTT_LTE: *** DIAGNOSIS: No individual CA validated the server chain ***
E (73323) MQTT_LTE: *** Running TLS stack isolation tests… ***
I (73333) MQTT_LTE: — Test A: seclevel=0 to www.google.com:443 (no cert validation) —
I (74843) MQTT_LTE: seclevel readback:
+QSSLCFG: “seclevel”,0,0
OK
I (75843) MODEM: SSL test: opening TLS connection to www.google.com:443 (ssl_ctx=0)
E (78003) MODEM: SSL test FAILED (err=579) to www.google.com:443
E (78503) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (78503) MQTT_LTE: *** Test A FAILED — modem TLS stack may be broken ***
I (78503) MQTT_LTE: — Test B: seclevel=0 to AWS endpoint (no cert validation) —
I (79513) MODEM: SSL test: opening TLS connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 (ssl_ctx=0)
E (81583) MODEM: SSL test FAILED (err=579) to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
E (82083) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (82083) MQTT_LTE: *** Test B FAILED — AWS may require client cert at TLS level ***
I (82083) MQTT_LTE: — Test C: seclevel=1 to AWS with CA[0] (server-auth only) —
I (85083) MQTT_LTE: seclevel readback:
+QSSLCFG: “seclevel”,0,1
OK
I (86083) MODEM: SSL test: opening TLS connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 (ssl_ctx=0)
E (88283) MODEM: SSL test FAILED (err=579) to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
E (88793) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (88793) MQTT_LTE: *** Test C FAILED — CA truly doesn’t validate server chain ***
E (88793) MQTT_LTE: *** Run: openssl s_client -connect a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883 -CAfile AmazonRootCA1.pem -showcerts ***
I (88803) MQTT_LTE: — Test D: Fresh SSL context 1, NO certs, seclevel=0 to Google —
I (89323) MQTT_LTE: sslversion:
OK
I (91823) MQTT_LTE: ctx1 sslversion:
+QSSLCFG: “sslversion”,1,4
OK
I (92323) MQTT_LTE: ctx1 seclevel:
+QSSLCFG: “seclevel”,1,0
OK
I (92833) MQTT_LTE: ctx1 ciphersuite:
+QSSLCFG: “ciphersuite”,1,0XFFFF
OK
I (93333) MQTT_LTE: ctx1 cacert:
OK
I (93833) MQTT_LTE: ctx1 clientcert:
OK
I (94333) MQTT_LTE: ctx1 clientkey:
OK
I (94833) MQTT_LTE: ctx1 sni:
+QSSLCFG: “sni”,1,1
OK
I (95833) MODEM: SSL test: opening TLS connection to www.google.com:443 (ssl_ctx=1)
E (98363) MODEM: SSL test FAILED (err=579) to www.google.com:443
E (98863) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (98863) MQTT_LTE: *** Test D FAILED — TLS broken even on clean context ***
I (98863) MQTT_LTE: — Test E: Probing AT+QSECWRITE support —
W (99373) MODEM: RX [ERR]:
ERROR
I (99373) MQTT_LTE: QSECWRITE not supported (QFUPL path is correct)
W (99873) MODEM: RX [ERR]:
ERROR
I (99873) MQTT_LTE: — Test F: seclevel=0 ctx 1, sslversion=3 (TLS 1.2 only) —
I (100373) MQTT_LTE: sslversion set to 3 (TLS 1.2):
OK
I (101373) MODEM: SSL test: opening TLS connection to www.google.com:443 (ssl_ctx=1)
E (103403) MODEM: SSL test FAILED (err=579) to www.google.com:443
E (103903) MODEM: SSL error detail:
+QIGETERROR: 0,operate successfully
OK
E (103903) MQTT_LTE: *** Test F FAILED — TLS broken regardless of version ***
I (106003) MODEM: Modem time:
+CCLK: “26/02/18,20:51:06+00”
OK
I (110003) MODEM: SSL context 0 configured for mTLS — reading back config:
I (110503) MODEM: sslversion:
+QSSLCFG: “sslversion”,0,3
OK
I (111013) MODEM: ciphersuite:
+QSSLCFG: “ciphersuite”,0,0XFFFF
OK
I (111513) MODEM: seclevel:
+QSSLCFG: “seclevel”,0,2
OK
I (112013) MODEM: cacert:
+QSSLCFG: “cacert”,0,“ca.pem”
OK
I (112523) MODEM: clientcert:
+QSSLCFG: “clientcert”,0,“client.pem”
OK
I (113033) MODEM: clientkey:
+QSSLCFG: “clientkey”,0,“client.key”
OK
I (113533) MODEM: sni:
+QSSLCFG: “sni”,0,1
OK
I (114043) MODEM: ignorelocaltime:
+QSSLCFG: “ignorelocaltime”,0,1
OK
I (114543) MODEM_MQTT: MQTT bound to PDP context 1
I (116543) MODEM_MQTT: MQTT SSL enabled (ctx 0)
I (116543) MQTT_LTE: MQTT connection attempt 1/3 to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
I (116543) MQTT_LTE: Opening MQTT connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
W (117053) MODEM: RX [ERR]:
ERROR
E (119973) MODEM_MQTT: QMTOPEN failed (result=5):
+QMTOPEN: 0,5
E (119973) MQTT_LTE: Failed to open MQTT TCP connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
W (119973) MQTT_LTE: Attempt 1 failed, retrying in 5000 ms…
I (124983) MQTT_LTE: MQTT connection attempt 2/3 to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
I (124983) MQTT_LTE: Opening MQTT connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
W (125493) MODEM: RX [ERR]:
ERROR
E (128233) MODEM_MQTT: QMTOPEN failed (result=5):
+QMTOPEN: 0,5
E (128233) MQTT_LTE: Failed to open MQTT TCP connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
W (128233) MQTT_LTE: Attempt 2 failed, retrying in 5000 ms…
I (133243) MQTT_LTE: MQTT connection attempt 3/3 to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
I (133243) MQTT_LTE: Opening MQTT connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
W (133753) MODEM: RX [ERR]:
ERROR
E (136503) MODEM_MQTT: QMTOPEN failed (result=5):
+QMTOPEN: 0,5
E (136503) MQTT_LTE: Failed to open MQTT TCP connection to a2w1tnlfha6u8c-ats.iot.us-gov-west-1.amazonaws.com:8883
E (136503) MQTT_LTE: LTE MQTT failed after 3 attempts