Forum Discussion
Yann_Desmarest_
May 11, 2016Nacreous
Hello,
This message indicates that the SSL version or the Cipher list supported by the F5 and its peer (the client) doesn't match.
You should do a tcpdump on the client or on the F5 system to check the ssl handshake. You may see that there is no matching ciphers between the browser and the VS.
You can also setup the debug level for SSL on System >> Logs >> Options
- Benjamin_8557May 11, 2016Altostratusthank you for these advices. By default, the SSL handshake is done in TLSv1.2. What I see in my ltm log: Connection error: ssl_select_suite:4136: TLS_FALLBACK_SCSV with a lower protocol (86) I disabled the TLSv1.2 on my SSL profile. Now it works in TLSv1.1 but I still don't understand why the SSL handshake fails with TLSv1.2 . thank you;
- Yann_Desmarest_May 11, 2016NacreousWhen you trace the ssl connection, what are the cipher list advised by each peer and which ssl version is used ? I already seen changes between ssl version and ciphers advised when using or not using Client Authentication
- Yann_Desmarest_May 11, 2016NacreousHow did you configured the Client certificate option : Require, Request or Ignore ? If set in Require, try setting Request and TLS1.2 enabled Moreover, the TLS_FALLBACK_SCSV option allow the server (bigip) to reject a connection if the client use TLS1.1 and the TLS_FALLBACK_SCSV field but the server support at best TLS1.2. When Client Certificate is enabled, the client may try to establish a session using TLS1.1. And without client cert, the client may use TLS1.2.