Forum Discussion
kridsana
Feb 24, 2022Cirrocumulus
How to find which cipher suit is used or not?
For example we have cipher suite as below ECDHE-RSA-AES128-GCM-SHA256 (0xc02f) SHA256 ECDHE-RSA-AES128-CBC-SHA (0xc013) SHA ECDHE-RSA-AES128-SHA256 (0xc027) SHA256 How can we know w...
CA_Valli
Feb 28, 2022MVP
Hello, you can restrict cipher suites selection from your clientssl/serverssl profiles.
When you're tuning it, you can list the suites allowed by your string using bash command tmm --clientciphers <string> , ex. tmm --clientciphers "DEFAULT".
With "@STRENGTH" syntax one can have the cipher negotiation start with the strongest cipher and progress to the weakest (example: "DEFAULT@STRENGTH" ).
Here's an SSL cheatsheet by the way.
Best way to determine which one is negotiated is performing a packet capture. Or, log it with an iRule.
when CLIENTSSL_CLIENTHELLO {
set client_ciphers [SSL::cipher clientlist]
log local0. "Cipher suite ID's available for negotiation (client selection): $client_ciphers"
}
when CLIENTSSL_HANDSHAKE {
set suite [SSL::cipher name]
log local0. "Selected suite: $suite"
}
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects