Forum Discussion

smp_86112's avatar
smp_86112
Icon for Cirrostratus rankCirrostratus
Aug 10, 2010

Specifying Ciphers in Client SSL Profiles

We just encountered a situation where (we believe) upgrading to 10.2.0 broke SSL connections for particular clients. According to the 10.2 release notes, MD5 ciphers were taken out of the default SSL cipher list. And the clients having the problem use only the TLS_RSA_WITH_RC4_128_MD5 cipher suite, which I have validated in a network trace.

 

 

According to the OpenSSL doc, TLS_RSA_WITH_RC4_128_MD5 equates to the "RC4-MD5" cipher list which I can add to the cipher list in the Client SSL profile. What I wanted to do is simply add RC4-MD5 to the DEFAULT list of ciphers, like this:

 

 

DEFAULT:RC4-MD5

 

 

However this didn't appear to work, the handshake still fails. According to F5 doc, the DEFAULT cipher list explicitly removes MD5 ciphers:

 

 

!SSLv2:ALL:!DH:!ADH:!EDH:!MD5:!EXPORT:!DES:@SPEED

 

 

I've seen a prepended addition sign (+) in the cipher list in some of the documentation, but I've never seen the documentation about when you would use it. I'm wondering if there's a conflict between !MD5 in the DEFAULT cipher list and my :RC4-MD5?