Forum Discussion
iRule to Decide which VS to use.
The point of this is that we have multiple domains and therefore need multiple SSL Client side profiles, as you can only have 1 SSL profile per VS we would need multiple VSs. This would mean having to use up multiple external IP address.
The basic requirement is to be able to present a spesific SSL Client profile based on the users URL request.
My though was to have a "Master iRule" which looks at the URL request and then directs the user to the corrct VS.
Any thoughts?
20 Replies
- nitass
Employee
is it okay to receive certificate warning page when accessing? - Core_Matrix_174
Nimbostratus
Hey guys thanks for the quick reply. - Kevin_Stewart
Employee
SNI, like wildcard and SAN certificates, allows you to have multiple SSL sites with the same IP (same VIP). SNI is somewhat different though because it's actually an extension to the TLS protocol that, when supported, allows the server to "switch" the server certificate it presents based on what the client is asking for. Essentially, in the client's SSL CLIENTHELLO message, the client would normally say "hello, I'd like to talk SSL, and these are the ciphers I support". With SNI, the client says, "hello, I'd like to talk SSL, and this is the hostname I'd like to talk to, and here are the ciphers I support". Most modern browsers now support SNI, though you should still consider what your client base may be. To enable SNI, create a separate client SSL profile for each hostname and enter that name into the Server Name block of the profile. Also select one of the profiles to be the default should the user access with an IP or not support SNI. Apply all of these client SSL profiles to the virtual server. SNI requires v11, but that's all it takes to configure. - What_Lies_Bene1
Cirrostratus
Thanks Kevin.
You could create an iRule to redirect, but you'll need to terminate the SSL session on the F5 first and you'll have to use a single SSL certificate (for a single FQDN/CN) to do that (unless SNI is a possibility). Presumably that won't be the certificate for the domain the user has entered in their browser. If your users can tolerate a certificate warning page (when they initially connect and before you redirect them) then that's fine but it seems unlikely.
- nitass
Employee
3. Problem is that it's not multiple sub domains it's multiple domains. i understand SAN certificate supports multiple domain name. - Kevin_Stewart
Employee
Yes, SAN or wildcard certificates, albeit typically expensive, are a definite solution. They also don't require any specific browser support. Wildcard certificates provide, as the name implies, an single SSL certificate that covers all of a given domain (ex. *.mydomain.com). A subject alternative name certificate is similar, but allows a named set of hosts. - Core_Matrix_174
Nimbostratus
I know with SANS the client could if they view the Cert, see all the possible domains included in that certs. Unfortunally our requirement would not make this viable. - What_Lies_Bene1
Cirrostratus
You can't read the host name until AFTER you've terminated the SSL. - Kevin_Stewart
Employee
I think your best bet then is SNI. Take a look at this article for an idea on browser SNI support (http://en.wikipedia.org/wiki/Server_Name_Indication). The list includes IE7 and Firefox 2, so you'll likely be okay for 99% of users. As Steve says, you can't see any of the HTTP data (host, URI, etc.) until AFTER you've negotiated the SSL session. - Mohamed_Lrhazi
Altocumulus
You can't read the host name until AFTER you've terminated the SSL.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com