Forum Discussion
ServerSSL profile issues after upgrade to v11.4.1
Hi. I am in processing of upgrading from 10.2.4HF5 to 11.4.1HF3 and have hit a problem that i cannot resolve.
Basically one of my ServerSSL profiles is failing after upgrade.
If I remove the profile everything works as expected.
The profile before change looks like this:
profile serverssl PROFILE_SYST_WASHCI3_INTERNAL_LIVE_SERVERSSL {
defaults from serverssl ca file "ISOSEM.crt" ciphers "HIGH:MEDIUM:!SSLv2:!ADH" options dont insert empty fragments renegotiate enable renegotiate period indefinite renegotiate size indefinite peer cert mode require authenticate once authenticate depth 9 authenticate name "hci3syst01.internal.company.com" unclean shutdown enable handshake timeout 60 alert timeout 60 cache size 20000 cache timeout 300The profile after change looks like this:
ltm profile server-ssl /SOA/PROFILE_SYST_WASHCI3_INTERNAL_LIVE_SERVERSSL { alert-timeout 60 app-service none authenticate once authenticate-depth 9 authenticate-name hci3syst01.internal.company.com ca-file /Common/ISOSEM.crt cache-size 20000 cache-timeout 300 ciphers DEFAULT:!TLSv1_1:!TLSv1_2 defaults-from /Common/serverssl handshake-timeout 60 options { dont-insert-empty-fragments } peer-cert-mode require renegotiate-period indefinite renegotiate-size indefinite renegotiation enabled secure-renegotiation require unclean-shutdown enabledI had to change the ciphers as I was seeing following errors in log when trying to connect:
Jun 9 10:14:44 bipscint2 warning tmm[13423]: 01260017:4: Connection attempt to insecure SSL server (see RFC5746) aborted: 172.31.100.195:443 Jun 9 10:14:44 bipscint2 info tmm[13423]: 01260013:6: SSL Handshake failed for TCP from 172.31.81.95:62326 to 172.31.100.195:443After changing ciphers I am now just getting:
Jun 9 10:12:40 bipscint2 info tmm1[13423]: 01260013:6: SSL Handshake failed for TCP from 172.31.81.95:62163 to 172.31.100.195:443I also changed the secure-renegotiation to require-strict to request (as I have seen issues with this)
I have tried numerous Cipher settings and none have been successful.
When I run a SSLDump I get the following:
New TCP connection 1: 172.31.81.95(62005) <-> server.internal.company.com(443)
1 1 0.0013 (0.0013) C>S Handshake
ClientHello
Version 3.1
cipher suites
TLS_RSA_WITH_RC4_128_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Unknown value 0xc013
Unknown value 0xc014
Unknown value 0xc012
Unknown value 0xff
compression methods
NULL
1 2 0.0027 (0.0014) S>C Alert
level fatal
value handshake_failure
1 0.0031 (0.0003) S>C TCP FIN
10.0032 (0.0001) C>S TCP RST
I know it looks like it’s server problem but this did work on version 10.2.4
Cipher combinations I have tried (in no particular order)
DEFAULT:!TLSv1_1:!TLSv1_2:TLSv1
RC4-SHA:DEFAULT:!TLSv1_1:!TLSv1_2:!TLSv1 RC4-SHA:DEFAULT:!TLSv1_1:!TLSv1_2 TLSv1 TLSv1:DEFAULT HIGH:MEDIUM:!SSLv2:!ADH:!TLSv1_1:!TLSv1_2 HIGH:MEDIUM:!SSLv2:!ADH:!TLSv1_1:!TLSv1_2 RC4-MD5:DEFAULT:!TLSv1_1:!TLSv1_2:!TLSv1 RC4-MD5:DEFAULT:!TLSv1_1:!TLSv1_2 TLSv1The server is only configured to allow RC4-MD5 ciphers.
However even putting this in still generates same error messageAny ideas?
29 Replies
- nitass
Employee
have you tried ciphers ALL? try ssldump again and see whether server still resets.
- LyonsG_85618
Cirrostratus
Hi Nitass Cipher settings set to ALL. SSL Dump 2 0.0026 (0.0015) S>C Handshake ServerHello Version 3.1 session_id[32]= 00 02 20 ec ab 11 f5 3c 34 9d 30 d5 01 47 9d 0e 14 7b ac c0 58 58 58 58 53 98 1e 3a 00 01 a6 8b cipherSuite TLS_RSA_WITH_RC4_128_MD5 compressionMethod NULL Certificate ServerHelloDone 2 0.0028 (0.0002) C>S TCP RST - LyonsG_85618
Cirrostratus
Still have not heard back from support either. Will chase them up and advise them of this thread! Thanks for your help
- nitass_89166
Noctilucent
2 0.0028 (0.0002) C>S TCP RST
but this time bigip is the one who reset, isn't it?
have you tried to set peer-cert-mode to ignore in serverssl profile?
- LyonsG_85618
Cirrostratus
Nitass - thanks. That is now working. I still need to understand why we need to change all ciphers and Server Certificate=request/ignore. But I guess that will be easier fro support to identify now. Thanks to everyone for their assistance! As usual DevCentral rocks!
- nitass
Employee
2 0.0028 (0.0002) C>S TCP RST
but this time bigip is the one who reset, isn't it?
have you tried to set peer-cert-mode to ignore in serverssl profile?
- LyonsG_85618
Cirrostratus
Nitass - thanks. That is now working. I still need to understand why we need to change all ciphers and Server Certificate=request/ignore. But I guess that will be easier fro support to identify now. Thanks to everyone for their assistance! As usual DevCentral rocks!
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com