Forum Discussion
OpenSSL and Heart Bleed Vuln
Get the latest updates on how F5 mitigates Heartbleed
Hi Team,
I know this question is eventually going to be asked - I may as well do it.
With the news today about the Heartbleed OpenSSL Vulnerability (http://heartbleed.com) I wanted to confirm if we are at any risk. All of my LTM V11 and V10 instances are running OpenSSL 0.9.8x which does not appear to be a vulnerable version of OpenSSL... Does the F5 hook into this when we Sign/Request SSL Certs? If so we're sitting pretty, right?
Thanks.
Updates based on feedback:
ul
Update 2: F5 have published a security advisory on this issue - http://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
- Kip_Young_DL_14NimbostratusI'm also interested in F5's official stance on this.
- Ferg_104721Nimbostratus
What versions of the OpenSSL are affected?
Status of different versions:
OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable OpenSSL 1.0.1g is NOT vulnerable OpenSSL 1.0.0 branch is NOT vulnerable OpenSSL 0.9.8 branch is NOT vulnerable
veriosn 11.3/11.4 uses openssl 0.9.8, run openssl version on cli to confirm
- Ferg_104721Nimbostratus
if you want to test you could use
http://filippo.io/Heartbleed/
- Beinhard_8950NimbostratusSome other testtool that you run by yourself. https://gist.github.com/sh1n0b1/10100394 http://s3.jspenguin.org/ssltest.py
- BinaryCanary_19Historic F5 AccountIt's easy to know if you're vulnerable to this: You are running an affected openssl version. You can simply run "openssl version" on the CLI.
- that onyl shows half of the picture in some cases and isnt always possible with appliances.
- James_Deucker_2Historic F5 Account
My 11.5.0 comes back as not vulnerable.
- BinaryCanary_19Historic F5 AccountBy default, only native ciphers are used.
- Kiozs_131042Altocumulushow did you test it out ? we did test last 2 days ago, V11.5.0 management access is vulnerable.
- squip_86995Nimbostratus
You can check if you are retuning the TLS heartbeat extension using the following from bash:
openssl s_client -connect google.com:443 -tlsextdebug 2>&1| grep 'server extension "heartbeat" (id=15)' || echo safe
It with return the extension if affected, otherwise "Safe". If it does return the extension, check your version of OpenSSL ...This should be no-one running an F5 I don't think.
- wbbigdave_97776NimbostratusFrom what are you running this bash?
- squip_86995NimbostratusFrom my workstation
- Frank__30499NimbostratusThe string just before the pipe symbol is translated. It should be 2>&1 to tie stderr to stdout.
- gsdeol_34170Nimbostratus
Hi Guys, I have one question, whether the F5s use Openssl for SSL offloading functionality? Or is it just a tool installed on the F5s to use for SSL testing.
Thanks
- Ferg_104721Nimbostratus
To the question about offload, it is my understanding that the openssl is used for csr and cert creation but not for the offloading functionality.
- Jason_KeatingAltostratus
According to SOL14457 11.5.0 uses 1.0.1e which is vulnerable http://support.f5.com/kb/en-us/solutions/public/14000/400/sol14457.html
Apparently 1.0.1g or greater addresses the vuln.
I would also like to know (for sure) if OpenSSL is used for offloading, James comment above that his 11.5.0 appears not subject to the vulnerability suggests it's not ... regardless I imagine a patch is needed.
- What_Lies_Bene1Cirrostratus
Whether OpenSSL is used or not will depend on the cipher string in your SSL profiles. If you're using the DEFAULT or NATIVE strings or something else that only uses native ciphers then OpenSSL is NOT used and the Cavium offload card (and related proprietary SSL/TLS software) is. If you're using something else (a compat cipher) then OpenSSL is.
A cipher string specifying any compat cipher, even if the rest are native, will result in OpenSSL being used.<Find the definitive list here and modify your profiles accordingly: http://support.f5.com/kb/en-us/solutions/public/13000/100/sol13163.html.
Also remember that you'll get much better performance if you only use native ciphers.
- Sean_82866Nimbostratus
It's important to note that the management console is also vulnerable, making the question of whether your individual hosts are exposed moot for some installations.
Hopefully F5 will give us some good news this morning.
- What_Lies_Bene1CirrostratusTrue, but you'd hope the management interface is on a pretty secure, private network rather than a public facing one.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com