Forum Discussion
server-side ssl not negotiating
I have a standard Virtual Server (443) that terminates ssl on the client side, and re-encrypts on the server side. Just as I have done many times.
LTM logs (ssl debug) yields:
01260013 SSL Handshake failed for TCP from 10.xxx.x.218:6914 to 10.yyy.yyy.51:443
I can https into any of the single servers (Firefox says - TLS_RSA_WITH_AES_128_CBC_SHA TLS1.2)
from command prompt:
openssl s_client -connect 10.yyy.yyy.51:443
SSL handshake has read 3988 bytes and written 465 bytes
New, TLSv1/SSLv3, Cipher is AES128-SHA Server public key is 2048 bit
The built in LTM monitors, based on the f5 pre-canned https, pass no problem.
Yet when I try going through the VS, it's a no-go on the server side.
I pulled in another server serving up the default IIS page on 443, and it works OK.
Any suggestions would be greatly appreciated. I have tried all kinds of cipher strings, eliminating SSLv3.
The problem server's IOS is Windows 2008.
11 Replies
- Arnaud_Lemaire
Employee
Can you have a look to a pcap with wireshark to see any usefull debug info ? as well you have some statistics in SSL profiles on the big-ip which could help to understand the type of error.
- OTS02
Cirrus
Hi Arnaud,
Wiresharks show that when the server is accessed through the VS, it immediately responds to the ssl handshake with a TCP reset. The server logs (Windows 2008) show the same thing. Unfortunately, I do not know how to find the reason for the reset. The odd thing is, you can go directly to the server no problem. Also https monitors are having no problem. I have set the server-side ssl profile cipher list to 'ALL'.
If you could point me in the right direction, I will look at the SSL profile statistics. In the GUI, I have found the Server SSL statistics, but have not yet discovered how to narrow it down to the SSL profile of interest.
At first I thought this looked like an asymmetrical routing issue, but I have ruled that out. BTW, I can put other HTTPS servers in this pool, and they work just fine. So I think that there is something with this set of servers that is the problem. Just knowing the reason for the handshake refection would be a tremendous step forward. Thanks you for your help.
- OTS02
Cirrus
I found the individual server ssl stats in TMSH. Unfortunately, it only tallies the handshake failures - does not give any clue as to the reason.
- Brad_Parker_139
Nacreous
I made the server-side SSL profile cipher string = 'TLSv1' only and that made it work.
This is because Windows 2008 no R2 doesn't understand TLSv1.2 handshake initiation and it never allows it to negotiate down to TLSv1.
- OTS02
Cirrus
But when examining the ssldump of a browser going directly to the server, the browser first offers 1.2, and they negotiate down to 1.0. - Brad_Parker_139
Nacreous
A browser will retry the whole connection and has a different SSL stack than BigIP so the client behavior can be different. - OTS02
Cirrus
OK. I think the Windows 2008 server is kind of lame, but just the same, I'm pretty stinkin happy the goofy thing is working.
- Brad_Parker
Cirrus
I made the server-side SSL profile cipher string = 'TLSv1' only and that made it work.
This is because Windows 2008 no R2 doesn't understand TLSv1.2 handshake initiation and it never allows it to negotiate down to TLSv1.
- OTS02
Cirrus
But when examining the ssldump of a browser going directly to the server, the browser first offers 1.2, and they negotiate down to 1.0. - Brad_Parker
Cirrus
A browser will retry the whole connection and has a different SSL stack than BigIP so the client behavior can be different. - OTS02
Cirrus
OK. I think the Windows 2008 server is kind of lame, but just the same, I'm pretty stinkin happy the goofy thing is working.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com