Forum Discussion
soymanue
Nimbostratus
Jan 14, 2010Performance with SSL Server Offload
Hello
We haved changed Linux LVS for LTM to balance or SSL Apache Servers. During the migration, we have also installed the public SSL certificates in
the LTMs to offload the Apaches, and we're are using internal certificates between the LTM and the Apaches.
Since that, the measure of times to open the main page is quite worse than it used to be.
After activating oneconnect profile with 255.255.255.255 mask, the performance has improved, but is still quite worse that it used to be.
With an sniffer, the captures show that it looks as if certificate ciphering is continuously:
Client Key Exchange. Chage Cipher Spe, Encrypted Handshake Message
If the ssl profile and certificate are removed from the LTM, the sysmem behaves as it used to be. Ciphering is negotiatend at the beginning of the session.
The LTM negotiates SSLv3 with client, when it has the certificate. The Apache serves negotiates TLS1
3 Replies
- hoolio
Cirrostratus
Hi,
Which LTM version and platform are you using? Can you try creating a custom server SSL profile and disabling SSLv2 and SSLv3 in the profile?
If that doesn't work, you might try opening a case with F5 Support so they can review your full configuration and tcpdump/ssldumps.
Aaron - soymanue
Nimbostratus
Hello
I'm using version 10.0.1 build 283.0.
The ssl profile has these ciphers chains:
DEFAULT:!ADH:!EXPORT40:!EXP:!LOW:!DH:@STRENGTH
Which looks like this:
0: 53 AES256-SHA 256 SSL3 Native AES SHA RSA
1: 53 AES256-SHA 256 TLS1 Native AES SHA RSA
2: 57 DHE-RSA-AES256-SHA 256 SSL3 Compat AES SHA EDH/RSA
3: 57 DHE-RSA-AES256-SHA 256 TLS1 Compat AES SHA EDH/RSA
4: 10 DES-CBC3-SHA 192 SSL3 Native DES SHA RSA
5: 10 DES-CBC3-SHA 192 TLS1 Native DES SHA RSA
6: 22 DHE-RSA-DES-CBC3-SHA 192 SSL3 Compat DES SHA EDH/RSA
7: 22 DHE-RSA-DES-CBC3-SHA 192 TLS1 Compat DES SHA EDH/RSA
8: 4 RC4-MD5 128 SSL3 Native RC4 MD5 RSA
9: 4 RC4-MD5 128 TLS1 Native RC4 MD5 RSA
10: 5 RC4-SHA 128 SSL3 Native RC4 SHA RSA
11: 5 RC4-SHA 128 TLS1 Native RC4 SHA RSA
12: 47 AES128-SHA 128 SSL3 Native AES SHA RSA
13: 47 AES128-SHA 128 TLS1 Native AES SHA RSA
14: 51 DHE-RSA-AES128-SHA 128 SSL3 Compat AES SHA EDH/RSA
15: 51 DHE-RSA-AES128-SHA 128 TLS1 Compat AES SHA EDH/RSA
I don't know how to put TLS1 before SSL3
Thanks - soymanue
Nimbostratus
One more thing,
How do I disable SSL3? !SSL3 o !SSLv3 don't seen to work.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects
