1. Module Information
- Model: EG916Q-GL
- Firmware Revision: EG916QGLLGR01A05M04
- Network Status: Registered (Roaming), CSQ 15, PDP Context Active.
2. Problem Description
We are experiencing a persistent SSL Handshake Timeout (Error 579) when attempting to open secure sockets via AT+QSSLOPEN. The issue occurs across multiple endpoints, including AWS IoT Core and public servers like Google.
Key observations from the logs:
- TCP Connectivity is OK:
AT+QIOPENon port 443 towww.google.comsucceeds immediately (+QIOPEN: 11,0). - DNS is OK: The modem successfully resolves the AWS and Google endpoints.
- Network Latency is acceptable: Ping tests show an average RTT of ~280ms–330ms.
- Handshake fails even with Security Level 0: Even when
seclevelis set to0(no certificate validation) andsniis enabled, the modem returns+QSSLOPEN: 0,579. - Cross-Verification: An
openssl s_clienttest from a host machine on the same network confirms the AWS endpoint is reachable and providing a valid TLS v1.2 certificate chain.
3. Steps Taken to Troubleshoot
- Synchronized modem clock via
AT+CCLK. - Verified/Re-uploaded certificates to UFS.
- Tested with
seclevel0, 1, and 2. - Enabled
SNI(AT+QSSLCFG="sni",1,1).
5
at_cmd.txt (2.6 KB)
endpoint_verification.txt (1.6 KB)
. Flashed fresh PDP context and cleared all existing SSL configurations.
4. Request
Despite a stable TCP connection, the SSL engine consistently fails to complete the handshake. We suspect a potential issue with the internal SSL stack handling large certificate chains or a specific timeout setting not accessible via current AT commands.
Could you please provide:
- Clarification on why Error 579 persists when TCP is successful.
- Any specific configuration for
AT+QSSLCFGthat can increase the internal handshake timeout or fragment size for this firmware revision. - Recommendation on whether a firmware update is required to resolve TLS 1.2 handshake stability.
Supporting Log Attachment
(Attach your raw logs here, ensuring the following sequence is highlighted for the engineer:)
- The TCP Success:
AT+QIOPEN=1,11,"TCP","www.google.com",443,0,0→+QIOPEN: 11,0 - The SSL Failure:
AT+QSSLOPEN=1,1,0,"www.google.com",443,0→+QSSLOPEN: 0,579 - The Firmware Version:
EG916QGLLGR01A05M04 - The OpenSSL success from your laptop (to prove the server side is fine).