Forum Discussion
Stephen_Archer_
Oct 28, 2011Historic F5 Account
SHA2 / SHA256 certificates
I have a customer that wants to use SHA2 / SHA256 certificates on their website (fronted by LTM), however clients such as Windows XP SP2 are unable to verify such certificates. The customer would like to detect these clients and redirect them to a web page providing remediation advice.
I know it's possible to detect the cipher suites supported by the client: create a client SSL profile with weak ciphers allowed, then after SSL handshake completion, check the cipher suite used. It would then be possible to redirect clients using weak ciphers to the remediation page. But... if the client is unable to validate the SHA2 certificate, the SSL handshake will never complete.
The next option would be to binary scan the TCP::payload on the 'client hello' and check the presented cipher suites... however, I don't think that the list of cipher suites presented by the client tells us whether the client is able to validate a SHA2 certificate, or not. i.e. it may be possible that a client that does NOT list SHA2 / SHA256 in the list of supported cipher suites, but is still actually able to verify a SHA2 certificate.
So my question is, do I understand this issue correctly, and if I do, has anyone thought of a way to overcome it?
Thanks in advance!
- Steve_Brown_882Historic F5 AccountHey Arch,
- Rodney_80133Nimbostratus
Sorry to barge in, but the user-agent string does seem to give away something about the OS as well, this is my WinXP SP3 PC:
Is does look a bit weird (SV1), but maybe you can find a common string in the user-agent header of WinXP SP2 stations?
- Rodney_80133Nimbostratus
-
- Rodney_80133Nimbostratus
-
- Rodney_80133Nimbostratus
Sorry about this, each time I got a message the post was rejected but it still ended up here.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects