Forum Discussion
Antoine_80417
Apr 13, 2011Nimbostratus
Multiple certificate authorities and authentication profiles
Hello,
This is my first post on this forum so first, let me introduce myself : I'm a network an security engineer, I work for a company that uses quite a lot of F5 appliances as GTMs, LCs or LTMs with ASM module.
We are currently facing quite an issue with some of the appliances that are used as reverse proxy. We are asked to allow our clients to connect to some application using their own certificate.
The first part that we managed to figure out is the creation of the CA bundle that is advertised when the client certificate is required.
The second part on which we are struggling is the authentication profiles : we'd like to check the client certificate validity before allowing access to the application. When using a single CA, it is quite simple as you just have to create an authentication profile (OCSP or CRL) and apply it to the virtual server.
With mutliple CA, I guess I could create one authentication profile per CA and apply it to the virtual server, but I fear that may introduce some latency as there can be quite a lot of CA.
I would appreciate it a lot if you have any information on how to deal with this better than with multiple authentication profiles or on the performance that we can expect when using multiple authentication profiles.
Regards,
Antoine
- Michael_YatesNimbostratusAre you referring to the Client Authentication portion of the SSL Profile (Client)?
- Antoine_80417NimbostratusHello Michael,
- Michael_YatesNimbostratusI believe that the CRL in the Client Authentication portion of the SSL Profile (Client) is a list of revoked Client Certificates. It should not contain CA's.
- Joel_MosesNimbostratusHoolio, maybe you know this one since I know you've done work with extended cert revocation checking in the past: is it possible to read the issuer from a presented client cert and then use that value to change what OCSP profile you use in AUTH::start? Normally it's invoked with "[AUTH::start pam default_ssl_ocsp]", but if you know the specific name of the profile (say, my_ocsp_profile), can it be invoked with either "[AUTH::start pam tmm_my_ocsp_profile]" or "[AUTH::start pam my_ocsp_profile]"? The Wiki is a little weak in this area.
- hooleylistCirrostratusI think "default_ssl_ocsp" is a PAM service--not a user configured auth profile. In the past, when I needed to support multiple client cert issuers, I created an OCSP virtual server with an iRule which changed the pool based on the issuer value in the OCSP request. I'll hunt around and see if I can find the iRule.
- Joel_MosesNimbostratus"default_ssl_oscp" must be some sort of internal triggername for TMM; there are, when OCSP profiles are created, matching PAM profiles that are created in /etc/pam.d on the BigIP:
admin@usherjmosesf5:Active ~ ls -la /etc/pam.d/ total 62 drwxr-xr-x 9 root root 1024 Apr 15 10:50 . drwxr-xr-x 3 root root 1024 Apr 6 10:40 .. .... drwxr-xr-x 2 root root 1024 Mar 25 16:40 ocsp -rw-r--r-- 1 root root 154 Oct 18 13:17 other -r--r----- 1 root apache 482 Apr 15 10:24 [b]pam_ocsp_ocsp_test_config[/b] -r--r----- 1 root apache 69 Apr 15 10:24 [b]pam_ocsp_ocsp_test_config.conf[/b] -rw-r--r-- 1 root root 103 Oct 18 14:06 passwd .... lrwxrwxrwx 1 root root 17 Apr 6 10:30 system-auth -> local/system-auth drwxr-xr-x 2 root root 1024 Mar 25 16:40 tacacs lrwxrwxrwx 1 root root 25 Apr 15 10:24 [b]tmm_ocsp_test_profile -> pam_ocsp_ocsp_test_config[/b] lrwxrwxrwx 1 root root 25 Apr 15 10:50 [b]tmm_my_ocsp_profile -> pam_ocsp_ocsp_test_config[/b]
- Antoine_80417NimbostratusHi,
- hooleylistCirrostratusActually, are you trying to logically fail open if the OCSP server isn't available? If so, you could configure a pool containing the OCSP server address (assuming it's an IP and not a hostname) and then in your original AUTH iRule check to see if the OCSP server pool is up before trying to use AUTH::start.
- Antoine_80417NimbostratusNo the fail open is not a viable option. We will use CRL as a backup for OCSP.
Recent Discussions
Related Content
Â
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects