Forum Discussion
smp_86112
Dec 15, 2011Cirrostratus
Managing SSL Certificate Bundles
We are about changing SSL vendors, and it appears their root is already in the build-in "ca-bundle". However, their intermediates are not. I wanted to get some feedback on the right way to manage these certs from the admin GUI, as the dialog box labels and help are not very clear.
What I was thinking is that I would add the intermediate certificates to a new bundle that I create. Then in the New Client SSL Profile dialog box, I would leave the "Trusted Certificate Authorities" value at it's default ca-bundle, but change the "Chain" value to the new bundle I created containing the custom intermediates.
Is that how this is supposed to be managed? Should I be concerned about ca-bundle or my custom intermediate bundle being overwritten during an upgrade?
- HamishCirrocumulusThat's exactly how I doit. Leave the CA bundle as it is, and add the intermediates in the chain.
- HamishCirrocumulusOh... I haven't had any of my bundles over-written. Just make sure their name isn't the same as one of the bundles that's included and you'll be fine.
- smp_86112CirrostratusThanks Hamish. We got a certificate from our new vendor. Then I created a new client SSL profile with the cert/key, but left the Chain and Trusted Certificate Authorities values set at None. Finally I applied to a VIP. But when I hit the VIP, the cert validates just fine.
- HamishCirrocumulusThat just means the client you used already has the intmediate certs. Not all client ca databases are the same. So some will havethe intremediates and some wont. You just dont really know who until someone complains.
- nitassEmployeeyes, it is exactly what Hamish said. to verify, i remove intermediate certificate in client or use openssl command or use installation checker (if had).
- smp_86112CirrostratusYou were right, both the Root and the Intermediate certificates were in my browser. It is not clear to me whether I should include the Root certificate in the custom bundle, or just the Intermediate. So I tried to break the handshake by removing the root and intermediate from my browser (tried both IE and FF), and setting the Chain value in the Client SSL Profile to None. But when I make a connection, I don't get any error, and both the intermediate and root certificates are added automatically to my browser.
- hooleylistCirrostratusYour server cert might already be properly chained with intermediate cert(s) to a root cert in the browser (ie the browser already has the intermediate cert(s) and root cert installed). You can check this by viewing the cert in IE and then clicking on the Certification Path.
- smp_86112CirrostratusThanks for the feedback everyone. I have done some more testing, and I think I have convinced myself of how this works. But I ran into wierd quirks in both IE and FF while trying to understand the SSL interaction between the LTM and the browser. In IE, I removed both the root and intermediate certs from the browser, set the Chain value to None, and I expected IE to display the warning. Instead, I got no warning and both the root and intermediate certificates were added automatically - I didn't have to do anything. I'm inclined to chalk that up to our organization's group policy, though I'm not 100% convinced of that.
- hooleylistCirrostratusHi SMP,
- HamishCirrocumulusThat IE feature sounds like a bit of a security hole... Albeit a small one. But could be serious where you really do want to remove a Ca cert.. I cant think any time if like my ca certs automatically updated when id just removed one... Whether the browser was restarted (which should lose the ssl session) or not.
Recent Discussions
Related Content
Â
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects