Forum Discussion

kva_178637's avatar
kva_178637
Icon for Nimbostratus rankNimbostratus
Mar 09, 2015

Adding a new crypto set to the SSL Client Profile

I would like to add the support for the following ciphers to a specific SSL Client Profile on the LTM. I believe that I need to enter it into Configuration\Advanced\Ciphers in the new client profile. (I do not want to modify the default cipher list.)

 

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_DHE_DSS_WITH_AES_128_CBC_SHA

 

For example, for the fist one on the list, should the strings I put in look like the following? DEFAULT:ECDHE:ECDSA:AES128:CBC:SHA256 In case this is added, would all the cipher sets be still available in this SSL Client Profile? In case that I would only like to use the specific cipher set for this Client Profile, would I just use something like: ECDHE:ECDSA:AES128:CBC:SHA256

 

Thank you

 

4 Replies

  • This would only allow me to search the ciphers currently set up. For example using tmm --clientciphers HIGH will give me a list of the more secure ones that are already available.

     

    I am looking at adding clientciphers that are not defined yet, using something along the lines of the following KO: https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13171.html

     

    My question is, can I add a clientcipher that isn't listed using the following: ECDHE:ECDSA:AES128:CBC:SHA256 (and what would be the difference if one used DEFAULT:ECDHE:ECDSA:AES128:CBC:SHA256, forgive if the answer is obvious.)

     

    Thank you for your help

     

  • can I add a clientcipher that isn't listed using the following: ECDHE:ECDSA:AES128:CBC:SHA256 (and what would be the difference if one used DEFAULT:ECDHE:ECDSA:AES128:CBC:SHA256)

    e.g.

    [root@ve11c:Active:In Sync] config  tmm --clientciphers ECDHE:ECDSA:AES128:CBC:SHA256
           ID  SUITE                            BITS PROT    METHOD  CIPHER  MAC     KEYX
     0: 49200  ECDHE-RSA-AES256-GCM-SHA384      256  TLS1.2  Native  AES-GCM  SHA384  ECDHE_RSA
     1: 49192  ECDHE-RSA-AES256-SHA384          256  TLS1.2  Native  AES     SHA384  ECDHE_RSA
     2: 49172  ECDHE-RSA-AES256-CBC-SHA         256  TLS1    Native  AES     SHA     ECDHE_RSA
     3: 49172  ECDHE-RSA-AES256-CBC-SHA         256  TLS1.1  Native  AES     SHA     ECDHE_RSA
     4: 49172  ECDHE-RSA-AES256-CBC-SHA         256  TLS1.2  Native  AES     SHA     ECDHE_RSA
     5: 49170  ECDHE-RSA-DES-CBC3-SHA           192  TLS1    Native  DES     SHA     ECDHE_RSA
     6: 49170  ECDHE-RSA-DES-CBC3-SHA           192  TLS1.1  Native  DES     SHA     ECDHE_RSA
     7: 49170  ECDHE-RSA-DES-CBC3-SHA           192  TLS1.2  Native  DES     SHA     ECDHE_RSA
     8: 49199  ECDHE-RSA-AES128-GCM-SHA256      128  TLS1.2  Native  AES-GCM  SHA256  ECDHE_RSA
     9: 49191  ECDHE-RSA-AES128-SHA256          128  TLS1.2  Native  AES     SHA256  ECDHE_RSA
    10: 49171  ECDHE-RSA-AES128-CBC-SHA         128  TLS1    Native  AES     SHA     ECDHE_RSA
    11: 49171  ECDHE-RSA-AES128-CBC-SHA         128  TLS1.1  Native  AES     SHA     ECDHE_RSA
    12: 49171  ECDHE-RSA-AES128-CBC-SHA         128  TLS1.2  Native  AES     SHA     ECDHE_RSA
    13:   106  DHE-DSS-AES256-SHA256            256  TLS1.2  Native  AES     SHA256  DHE/DSS
    14:    61  AES256-SHA256                    256  TLS1.2  Native  AES     SHA256  RSA
    15: 49195  ECDHE-ECDSA-AES128-GCM-SHA256    128  TLS1.2  Native  AES-GCM  SHA256  ECDHE_ECDSA
    16: 49187  ECDHE-ECDSA-AES128-SHA256        128  TLS1.2  Native  AES     SHA256  ECDHE_ECDSA
    17:   162  DHE-DSS-AES128-GCM-SHA256        128  TLS1.2  Native  AES-GCM  SHA256  DHE/DSS
    18:   158  DHE-RSA-AES128-GCM-SHA256        128  TLS1.2  Native  AES-GCM  SHA256  EDH/RSA
    19:    64  DHE-DSS-AES128-SHA256            128  TLS1.2  Native  AES     SHA256  DHE/DSS
    20:   166  ADH-AES128-GCM-SHA256            128  TLS1.2  Native  AES-GCM  SHA256  ADH
    21: 49201  ECDH-RSA-AES128-GCM-SHA256       128  TLS1.2  Native  AES-GCM  SHA256  ECDH_RSA
    22: 49197  ECDH-ECDSA-AES128-GCM-SHA256     128  TLS1.2  Native  AES-GCM  SHA256  ECDH_ECDSA
    23: 49193  ECDH-RSA-AES128-SHA256           128  TLS1.2  Native  AES     SHA256  ECDH_RSA
    24: 49189  ECDH-ECDSA-AES128-SHA256         128  TLS1.2  Native  AES     SHA256  ECDH_ECDSA
    25:   156  AES128-GCM-SHA256                128  TLS1.2  Native  AES-GCM  SHA256  RSA
    26:    60  AES128-SHA256                    128  TLS1.2  Native  AES     SHA256  RSA
    
    [root@ve11c:Active:In Sync] config  tmm --clientciphers DEFAULT:ECDHE:ECDSA:AES128:CBC:SHA256
           ID  SUITE                            BITS PROT    METHOD  CIPHER  MAC     KEYX
     0:   159  DHE-RSA-AES256-GCM-SHA384        256  TLS1.2  Native  AES-GCM  SHA384  EDH/RSA
     1:   158  DHE-RSA-AES128-GCM-SHA256        128  TLS1.2  Native  AES-GCM  SHA256  EDH/RSA
     2:    57  DHE-RSA-AES256-SHA               256  TLS1    Native  AES     SHA     EDH/RSA
     3:    57  DHE-RSA-AES256-SHA               256  TLS1.1  Native  AES     SHA     EDH/RSA
     4:    57  DHE-RSA-AES256-SHA               256  TLS1.2  Native  AES     SHA     EDH/RSA
     5:    57  DHE-RSA-AES256-SHA               256  DTLS1   Native  AES     SHA     EDH/RSA
     6:    51  DHE-RSA-AES128-SHA               128  TLS1    Native  AES     SHA     EDH/RSA
     7:    51  DHE-RSA-AES128-SHA               128  TLS1.1  Native  AES     SHA     EDH/RSA
     8:    51  DHE-RSA-AES128-SHA               128  TLS1.2  Native  AES     SHA     EDH/RSA
     9:    51  DHE-RSA-AES128-SHA               128  DTLS1   Native  AES     SHA     EDH/RSA
    10:    22  DHE-RSA-DES-CBC3-SHA             192  TLS1    Native  DES     SHA     EDH/RSA
    11:    22  DHE-RSA-DES-CBC3-SHA             192  TLS1.1  Native  DES     SHA     EDH/RSA
    12:    22  DHE-RSA-DES-CBC3-SHA             192  TLS1.2  Native  DES     SHA     EDH/RSA
    13:    22  DHE-RSA-DES-CBC3-SHA             192  DTLS1   Native  DES     SHA     EDH/RSA
    14:   157  AES256-GCM-SHA384                256  TLS1.2  Native  AES-GCM  SHA384  RSA
    15:   156  AES128-GCM-SHA256                128  TLS1.2  Native  AES-GCM  SHA256  RSA
    16:    61  AES256-SHA256                    256  TLS1.2  Native  AES     SHA256  RSA
    17:    53  AES256-SHA                       256  TLS1    Native  AES     SHA     RSA
    18:    53  AES256-SHA                       256  TLS1.1  Native  AES     SHA     RSA
    19:    53  AES256-SHA                       256  TLS1.2  Native  AES     SHA     RSA
    20:    53  AES256-SHA                       256  DTLS1   Native  AES     SHA     RSA
    21:    60  AES128-SHA256                    128  TLS1.2  Native  AES     SHA256  RSA
    22:    47  AES128-SHA                       128  TLS1    Native  AES     SHA     RSA
    23:    47  AES128-SHA                       128  TLS1.1  Native  AES     SHA     RSA
    24:    47  AES128-SHA                       128  TLS1.2  Native  AES     SHA     RSA
    25:    47  AES128-SHA                       128  DTLS1   Native  AES     SHA     RSA
    26:    10  DES-CBC3-SHA                     192  TLS1    Native  DES     SHA     RSA
    27:    10  DES-CBC3-SHA                     192  TLS1.1  Native  DES     SHA     RSA
    28:    10  DES-CBC3-SHA                     192  TLS1.2  Native  DES     SHA     RSA
    29:    10  DES-CBC3-SHA                     192  DTLS1   Native  DES     SHA     RSA
    30: 49200  ECDHE-RSA-AES256-GCM-SHA384      256  TLS1.2  Native  AES-GCM  SHA384  ECDHE_RSA
    31: 49199  ECDHE-RSA-AES128-GCM-SHA256      128  TLS1.2  Native  AES-GCM  SHA256  ECDHE_RSA
    32: 49192  ECDHE-RSA-AES256-SHA384          256  TLS1.2  Native  AES     SHA384  ECDHE_RSA
    33: 49172  ECDHE-RSA-AES256-CBC-SHA         256  TLS1    Native  AES     SHA     ECDHE_RSA
    34: 49172  ECDHE-RSA-AES256-CBC-SHA         256  TLS1.1  Native  AES     SHA     ECDHE_RSA
    35: 49172  ECDHE-RSA-AES256-CBC-SHA         256  TLS1.2  Native  AES     SHA     ECDHE_RSA
    36: 49191  ECDHE-RSA-AES128-SHA256          128  TLS1.2  Native  AES     SHA256  ECDHE_RSA
    37: 49171  ECDHE-RSA-AES128-CBC-SHA         128  TLS1    Native  AES     SHA     ECDHE_RSA
    38: 49171  ECDHE-RSA-AES128-CBC-SHA         128  TLS1.1  Native  AES     SHA     ECDHE_RSA
    39: 49171  ECDHE-RSA-AES128-CBC-SHA         128  TLS1.2  Native  AES     SHA     ECDHE_RSA
    40: 49170  ECDHE-RSA-DES-CBC3-SHA           192  TLS1    Native  DES     SHA     ECDHE_RSA
    41: 49170  ECDHE-RSA-DES-CBC3-SHA           192  TLS1.1  Native  DES     SHA     ECDHE_RSA
    42: 49170  ECDHE-RSA-DES-CBC3-SHA           192  TLS1.2  Native  DES     SHA     ECDHE_RSA
    43:   106  DHE-DSS-AES256-SHA256            256  TLS1.2  Native  AES     SHA256  DHE/DSS
    44: 49195  ECDHE-ECDSA-AES128-GCM-SHA256    128  TLS1.2  Native  AES-GCM  SHA256  ECDHE_ECDSA
    45: 49187  ECDHE-ECDSA-AES128-SHA256        128  TLS1.2  Native  AES     SHA256  ECDHE_ECDSA
    46:   162  DHE-DSS-AES128-GCM-SHA256        128  TLS1.2  Native  AES-GCM  SHA256  DHE/DSS
    47:    64  DHE-DSS-AES128-SHA256            128  TLS1.2  Native  AES     SHA256  DHE/DSS
    48:   166  ADH-AES128-GCM-SHA256            128  TLS1.2  Native  AES-GCM  SHA256  ADH
    49: 49201  ECDH-RSA-AES128-GCM-SHA256       128  TLS1.2  Native  AES-GCM  SHA256  ECDH_RSA
    50: 49197  ECDH-ECDSA-AES128-GCM-SHA256     128  TLS1.2  Native  AES-GCM  SHA256  ECDH_ECDSA
    51: 49193  ECDH-RSA-AES128-SHA256           128  TLS1.2  Native  AES     SHA256  ECDH_RSA
    52: 49189  ECDH-ECDSA-AES128-SHA256         128  TLS1.2  Native  AES     SHA256  ECDH_ECDSA
    
  • Hi Nitass, thank you very much for your answer. This helped me to resolve my issue!!!

    When I try this command on our 11.4.1 system, I don't see any ECDHE with SHA256:

    [xxxx@xxxxxxx-new:Active:Changes Pending] ~ tmm --clientciphers ECDHE:ECDSA:AES128:CBC:SHA256

       ID  SUITE                            BITS PROT    METHOD  CIPHER  MAC     KEYX
    

    0: 49171 ECDHE-RSA-AES128-CBC-SHA 128 TLS1 Native AES SHA ECDHE_RSA

    1: 49171 ECDHE-RSA-AES128-CBC-SHA 128 TLS1.1 Native AES SHA ECDHE_RSA

    2: 49171 ECDHE-RSA-AES128-CBC-SHA 128 TLS1.2 Native AES SHA ECDHE_RSA

    3: 49172 ECDHE-RSA-AES256-CBC-SHA 256 TLS1 Native AES SHA ECDHE_RSA

    4: 49172 ECDHE-RSA-AES256-CBC-SHA 256 TLS1.1 Native AES SHA ECDHE_RSA

    5: 49172 ECDHE-RSA-AES256-CBC-SHA 256 TLS1.2 Native AES SHA ECDHE_RSA

    6: 49170 ECDHE-RSA-DES-CBC3-SHA 192 TLS1 Native DES SHA ECDHE_RSA

    7: 49170 ECDHE-RSA-DES-CBC3-SHA 192 TLS1.1 Native DES SHA ECDHE_RSA

    8: 49170 ECDHE-RSA-DES-CBC3-SHA 192 TLS1.2 Native DES SHA ECDHE_RSA

    9: 60 AES128-SHA256 128 TLS1.2 Native AES SHA256 RSA

    10: 61 AES256-SHA256 256 TLS1.2 Native AES SHA256 RSA

    [xxxx@xxxxxxx-new:Active:Changes Pending] ~

    I found this usefule: https://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/bigip-ssl-administration-11-5-0/3.html Note: The following are not included in the DEFAULT cipher suite: The DHE cipher suites Elliptic curve ciphers with DSA

    Since I am looking for something compatible with the device we have, I am also looking at DHE now: [xxxx@xxxxxxx-new:Active:Changes Pending] ~ tmm --clientciphers DHE

       ID  SUITE                            BITS PROT    METHOD  CIPHER  MAC     KEYX
    

    0: 51 DHE-RSA-AES128-SHA 128 SSL3 Native AES SHA EDH/RSA

    1: 51 DHE-RSA-AES128-SHA 128 TLS1 Native AES SHA EDH/RSA

    2: 51 DHE-RSA-AES128-SHA 128 TLS1.1 Native AES SHA EDH/RSA

    3: 51 DHE-RSA-AES128-SHA 128 TLS1.2 Native AES SHA EDH/RSA

    4: 57 DHE-RSA-AES256-SHA 256 SSL3 Native AES SHA EDH/RSA

    5: 57 DHE-RSA-AES256-SHA 256 TLS1 Native AES SHA EDH/RSA

    6: 57 DHE-RSA-AES256-SHA 256 TLS1.1 Native AES SHA EDH/RSA

    7: 57 DHE-RSA-AES256-SHA 256 TLS1.2 Native AES SHA EDH/RSA

    8: 21 DHE-RSA-DES-CBC-SHA 64 SSL3 Native DES SHA EDH/RSA

    9: 21 DHE-RSA-DES-CBC-SHA 64 TLS1 Native DES SHA EDH/RSA

    10: 21 DHE-RSA-DES-CBC-SHA 64 TLS1.1 Native DES SHA EDH/RSA

    11: 21 DHE-RSA-DES-CBC-SHA 64 TLS1.2 Native DES SHA EDH/RSA

    12: 22 DHE-RSA-DES-CBC3-SHA 192 SSL3 Native DES SHA EDH/RSA

    13: 22 DHE-RSA-DES-CBC3-SHA 192 TLS1 Native DES SHA EDH/RSA

    14: 22 DHE-RSA-DES-CBC3-SHA 192 TLS1.1 Native DES SHA EDH/RSA

    15: 22 DHE-RSA-DES-CBC3-SHA 192 TLS1.2 Native DES SHA EDH/RSA

    [xxxx@xxxxxxx-new:Active:Changes Pending] ~

    One of the combinations that would make the system work is: TLS_DHE_RSA_WITH_AES_128_CBC_SHA The following looked like they could work (since I read someplace that the CBC is optional normally), so I tested using DHE.

    0: 51 DHE-RSA-AES128-SHA 128 SSL3 Native AES SHA EDH/RSA

    1: 51 DHE-RSA-AES128-SHA 128 TLS1 Native AES SHA EDH/RSA

    2: 51 DHE-RSA-AES128-SHA 128 TLS1.1 Native AES SHA EDH/RSA

    3: 51 DHE-RSA-AES128-SHA 128 TLS1.2 Native AES SHA EDH/RSA

    I found that this works for me.

    Thank you for all your help.