Forum Discussion
Server Side SSL Handshake Failures
In order to determine which cipher suite and protocol was being used during a successful attempt to access the webpage by bypassing the BIG-IP, a capture was taken from the web server itself. This showed that TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 was the cipher suite used with TLS1.2. When looking at a TCPDump from the BIG-IP and then running a SSLDump against it, I see the client is sending a client hello using TLS1.1. My assumption was that negotiation would occur and they would establish a connection using 1.2 though we are not even getting to the point of negotiation because the server sends a RST immediately after the client hell. Will be testing ECDHE-RSA-AES256-GCM-SHA384:TLSv1_2 as the cipher string shortly to see the results.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com