Forum Discussion
squip_86995
Apr 07, 2014Nimbostratus
OpenSSL and Heart Bleed Vuln
Get the latest updates on how F5 mitigates Heartbleed
Hi Team,
I know this question is eventually going to be asked - I may as well do it.
With the news today about the Heartblee...
BinaryCanary_19
Apr 08, 2014Historic F5 Account
It's quite possible to work this out logically: Ref: http://support.f5.com/kb/en-us/solutions/public/13000/100/sol13163.html
-
There are ciphers which exist in Native but not in Compat.
-
YOu can specify "NATIVE:COMPAT" as a cipher string
-
Therefore, the stack used depends on which cipher is in use, with the natural preference being for NATIVE.
- BinaryCanary_19Apr 08, 2014Historic F5 AccountTested this just now on 11.2.1 using "NATIVE:COMPAT" as my cipher string on ssl profile. I can connect just fine using ciphers that are only present in NATIVE, and I can do the same using ciphers only present in COMPAT list. So that should confirm that the stack used is decided on a per-connection basis.
- BinaryCanary_19Apr 08, 2014Historic F5 AccountOne thing I find curious though, is that if I run "openssl ciphers" on my machine, I get a longer list of ciphers than is listed in Sol13163 in the compat list for my version (11.2.1).
- What_Lies_Bene1Apr 08, 2014CirrostratusYes, OpenSSL supports ALL the NATIVE ciphers as well as the compat ones but obviously those ciphers are handled by TMM and the offload hardware. Your test isn't definitive unless you check the stats and confirm that your connection shows as native, not compat.
- What_Lies_Bene1Apr 08, 2014Cirrostratustmsh show ltm profile client-ssl 'name' should show you what's what if you use it to display stats for a profile with a mix of native and compat.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects