Forum Discussion
David_McCulloch
Nimbostratus
Apr 27, 2005doing ssl persistance within socks protocol
Vilnis Asars from f5 recommended I posted a question here.
I have a bigip 9 box and I'd like to do ssl persistance within socks v5 protocol(http://www.faqs.org/rfcs/rfc1928.html). FYI. In big ip v3.3 ptf05 you actually had this feature already builtin.. I know that version is really old and is long gone so maybe this will help you..
I'm using aventail's socks5 version 5 server and client which proxies ssl v3.0 traffic within the socks proxy. When I use the standard ssl persistance I don't see the traffic being sent through the big ip. Using source ip based persistance works. However using ssl persistance within socks packets is what I need. So I take it I need some help in writing iRules. I tried to include a tcpdump attachment but I get an error when posting. If you want the tcpdump I can send to you.
To summarise after the standard socks connect and responses(packets 4 and 5 and 40 and 41) the socks header starts with the bytes 01 01 00 and the number of bytes to follow. In packet 7 the number of bytes to follow is 3e for example:
After this you should see standard ssl handshake traffic.
Hopefully this is enough to you started in helping me write and iRules filter.
Appreciate your help
Regards,
David McCulloch
Sr. Integration Engineer
Netifice Communications
206 438 7572
- bl0ndie_127134Historic F5 AccountDave, you may want to check out the following postings. They should have enough examples to get you started.
- David_McCulloch
Nimbostratus
G'day guys, - drteeth_127330Historic F5 AccountAfter the data is collected, you can parse it using the binary scan command. http://tmml.sourceforge.net/doc/tcl/binary.html
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects