Forum Discussion
Approxee
Nimbostratus
Jul 06, 2013Chain with one intermediate CA - LTM SSL
I would try this but this weekend I am not near a working F5 to try it. I just wanted to ask a question about this paragraph.
It is taken from here https://support.f5.com/kb/en-us/sol...r=291256...
Kevin_Stewart
Employee
Jul 06, 2013If I may clarify, the purpose of the chain is to help the client validate the server certificate presented by VIP. It should only ever contain intermediate certificates, as the roots should be purposefully installed on the clients through some other means. When a client receives the server certificate as part of the SSL negotiation, it must validate its trust in that certificate by chaining together all of the CAs in the hierarchy from the signing/issuance CA certificate up to the self-signed root. That is usually accomplished by explicitly storing these CA certificates in the client's root and intermediate authorities trust stores. A chain is only necessary then if you believe the clients will 1) not have a copy of an intermediate certificate, or 2) "if the client trusts the certificate of another CA further up the same hierarchy, the SSL server can present a chain of certificates which establish a chain of trust to a root CA whose certificate is trusted by the SSL client".
The bundle need only contain non-root CA certificates that might be missing from client trust stores.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects