Forum Discussion
Cynthia_18735
Nimbostratus
Apr 17, 2008Self-signed certificate in a Redirect
I have a virtual server setup to receive SSL traffic. The virtual server has a CLIENTSSL profile on it, with a self-signed SSL certificate. The virtual servers only purpose is to do a redirect. So, there is a rule in place that redirects.
So, for instance the user goes to the site as:
https:\\urlname.com (self-signed certificate here)
The rule redirects to:
https:\\www.urlname.com (Verisign certificat here)
In IE, this works just fine. The user doesn't get any pop-ups, etc. In Firefox, the user does get pop-ups, indicating there may be a security problem with the CA.
So, my question is - is there any way to get this to work on BigIP without the user receiving a security pop-up (short of getting a Verisign signed certificate).
1 Reply
- hoolio
Cirrostratus
If the browser is configured to generate an alert when the requested hostname doesn't match the subject of the SSL certificate a site presents, then I could see that it would work in IE. However, with default settings in IE, you should see the mismatched certificate warning. By design of SSL certificates there isn't a way to configure a web server to prevent the client from 'seeing' that the cert isn't valid. You'd need to get a certificate which is valid for the host name that the client requests, or change the browser settings for each client.
I'm not sure if it's feasible for you to do, but if you could have the clients make the first request to http://urlname.com (instead of https://urlname.com), you could avoid the cert mismatch issue.
Aaron
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects