Forum Discussion
ask_me_anytime_
Nimbostratus
Apr 15, 2010ServerSSL - SERVERSSL_HANDSHAKE not triggered on certificate check failiure ??
Hello,
during serverSSL handshake, i'm trying to log messages when pool member server ssl certificate is invalid (expired certificate ) and BIGIP rejects it.
In the serverssl profile, i set "Server Certificate" to "require".
When the pool member's ssl presents a expired certificate , the BIGIP rejects it, and the access is denied.
I want to log when the BIGIP rejects the certificate but my irule doesn't log it.
is there any wrong with with the below irule , please help.
when SERVERSSL_HANDSHAKE {
set cert_status [X509::verify_cert_error_string [SSL::verify_result]]
log local0. "$cert_status"
if { $cert_status eq "ok" } { log local0. "Cert verify result - OK"
} else {
log local0. "Certificate INVALID"
}
}
----
it seems if the handshake fails, its not going to trigger.
please help,
- hoolio
Cirrostratus
Hi, - ask_me_anytime_
Nimbostratus
hi,
- hoolio
Cirrostratus
In a quick test on a 10.1.0 test unit, when I set the cert mode to require and the server sends an expired cert, the SERVERSSL_HANDSHAKE event isn't triggered.when SERVERSSL_HANDSHAKE { log local0. "Connected to [IP::server_addr]:[TCP::server_port]" log local0. "Cert count: [SSL::cert count]"
- ask_me_anytime_
Nimbostratus
hi, - hoolio
Cirrostratus
LTM doesn't seem to parse the server cert at all when the server SSL profile option for certs is set to ignore. So I guess the value that the SSL verify commands return aren't valid. I'm not sure why it would return anything though. You could check with F5 Support on this.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects