Forum Discussion
Kevin_Stewart
Employee
Aug 23, 2007OCSP and new AUTH::status response codes
All,
According to the wiki, the AUTH_ERROR, AUTH_FAILURE and AUTH_SUCCESS events are being deprecated in favor of the new AUTH_RESULT event, and is evident in the default ocsp irules in the 9.2* and above releases. Also, according to the wiki, you should be able to determine the specific results of the AUTH_RESULT event by looking at the AUTH::status return code, where:
0 = success
1 = failure
-1 = error
2 = not authed
Using the original AUTH events on a 9.1.* box, I am able to capture incidences of each, given bad cert, error in processing cert, and good cert check. Using the new event on a 9.2.* box, I am only able to capture a success or failure (0 or 1). I have not been able to simulate the other 2 response codes. I'm less concerned with the not_authed status, but I would like to capture the error event.
My question then is what would cause an AUTH::status of -1 or 2?
Thank you.
Kevin
- Kevin_Stewart
Employee
All, - dimka___104021
Nimbostratus
Hi, - Kevin_Stewart
Employee
Hey dimka, - spark_86682Historic F5 AccountDo you have your client certificate "peer cert mode" set to "request" or "require"? If it's set to "require", then the certificate presented must pass all of the internal checks that the BIG-IP does before we continue with the connection, so that may be the behavior that you're (all) seeing. You should be able to set it to "request" and have processing continue. Note that you will need to ensure that your auth processing iRule handles the case where the client does not present any certificate at all.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects