F5 is upgrading its customer support chat feature on My.F5.com. Chat support will be unavailable from 6am-10am PST on 1/20/26. Refer to K000159584 for details.

Forum Discussion

Muhammad_Irfan1's avatar
Nov 03, 2014

SSL certificate, Client authentication failed.

Client have provided me a PKCS12 SSL certificate which i imported in F5 LTM 5000s and created a client side profile and attached it to HTTPS VS. Client also have the same certificate in his machine. Now when i set client authentication to ignore or request the clients connects with https but when i set it to require the client can not connect and VS statistics shows invalid certificate entries.

 

Do certificate needs to have IP,s of F5? if Yes which IP,s? external self ip, external float ip, VS IP. If not then why client is unable to authenticate the certificate?

 

12 Replies

    • Thanks for the article sir, I just read it and it helped in understanding how it works but My configuration seems alright. I got pass phrase from client which i put in pass phrase portion. But for testing purpose i uploaded same certificate in Windows machine but can't put pass phrase in windows machine any where. May be pass phrase is only put in server not client.
    • Muhammad_Irfan1's avatar
      Muhammad_Irfan1
      Icon for Cirrus rankCirrus
      Thanks for the article sir, I just read it and it helped in understanding how it works but My configuration seems alright. I got pass phrase from client which i put in pass phrase portion. But for testing purpose i uploaded same certificate in Windows machine but can't put pass phrase in windows machine any where. May be pass phrase is only put in server not client.
  • My configuration seems alright.

    can you post the configuration here?

     tmsh list ltm virtual (name)
     tmsh list ltm pool (name)
     tmsh list ltm profile client-ssl (name)
    
    • ltm virtual Siebel-VS { auto-lasthop enabled cmp-enabled no destination 10.50.171.5:cbt ip-protocol tcp mask 255.255.255.255 pool SIEBEL_APP_POOL profiles { Anaylytics1 { } Siebel-Client { context clientside } Tibco-HTTP { } tcp { } } rules { SIEBEL_VS.app/SIEBEL_VS_web_activex_irule logging_iRule } source 0.0.0.0/0 source-address-translation { type automap } vs-index 28 --------------------------------------------------------------- ltm pool Tibco-LB-Group3 { members { tbpbws01:9851 { address 10.50.169.14 session monitor-enabled state up } tbpbws02:9851 { address 10.50.169.16 session monitor-enabled state up } } monitor Tibco-9851 reselect-tries 4 } ------------------------------------------------------------------ ltm profile client-ssl Siebel-Client { alert-timeout 10 allow-non-ssl disabled app-service none authenticate once authenticate-depth 9 ca-file Siebel-SSL-CA1.crt cache-size 262144 cache-timeout 3600 cert Siebel-SSL-CA1.crt chain none ciphers DEFAULT client-cert-ca Siebel-SSL-CA1.crt crl-file none defaults-from clientssl handshake-timeout 10 key Siebel-SSL-CA1.key mod-ssl-methods disabled options { dont-insert-empty-fragments } peer-cert-mode require proxy-ssl disabled renegotiate-max-record-delay indefinite renegotiate-period indefinite renegotiate-size indefinite renegotiation enabled retain-certificate true secure-renegotiation require server-name none session-ticket disabled sni-default false sni-require false strict-resume disabled unclean-shutdown enabled }
  • My configuration seems alright.

    can you post the configuration here?

     tmsh list ltm virtual (name)
     tmsh list ltm pool (name)
     tmsh list ltm profile client-ssl (name)
    
    • Muhammad_Irfan1's avatar
      Muhammad_Irfan1
      Icon for Cirrus rankCirrus
      ltm virtual Siebel-VS { auto-lasthop enabled cmp-enabled no destination 10.50.171.5:cbt ip-protocol tcp mask 255.255.255.255 pool SIEBEL_APP_POOL profiles { Anaylytics1 { } Siebel-Client { context clientside } Tibco-HTTP { } tcp { } } rules { SIEBEL_VS.app/SIEBEL_VS_web_activex_irule logging_iRule } source 0.0.0.0/0 source-address-translation { type automap } vs-index 28 --------------------------------------------------------------- ltm pool Tibco-LB-Group3 { members { tbpbws01:9851 { address 10.50.169.14 session monitor-enabled state up } tbpbws02:9851 { address 10.50.169.16 session monitor-enabled state up } } monitor Tibco-9851 reselect-tries 4 } ------------------------------------------------------------------ ltm profile client-ssl Siebel-Client { alert-timeout 10 allow-non-ssl disabled app-service none authenticate once authenticate-depth 9 ca-file Siebel-SSL-CA1.crt cache-size 262144 cache-timeout 3600 cert Siebel-SSL-CA1.crt chain none ciphers DEFAULT client-cert-ca Siebel-SSL-CA1.crt crl-file none defaults-from clientssl handshake-timeout 10 key Siebel-SSL-CA1.key mod-ssl-methods disabled options { dont-insert-empty-fragments } peer-cert-mode require proxy-ssl disabled renegotiate-max-record-delay indefinite renegotiate-period indefinite renegotiate-size indefinite renegotiation enabled retain-certificate true secure-renegotiation require server-name none session-ticket disabled sni-default false sni-require false strict-resume disabled unclean-shutdown enabled }
  • ca-file Siebel-SSL-CA1.crt

     

    is Siebel-SSL-CA1.crt signed client certificate?

     

    • Muhammad_Irfan1's avatar
      Muhammad_Irfan1
      Icon for Cirrus rankCirrus
      yes this certificate is provided by client. Today i did little trouble shooting and found that their was a chain of certificates. Then i downloaded them from links provided in certificates. I made a bundle of them and put it in Certificate authority in SSL client profile also put them in windows system and browser. Now only one problem is left. browser matches all the certificates but open ssl shows only one error that root certificate is self-signed. Root certificate will always be self-signed right because there is not certificate above it. Please help me out what to do now
  • ca-file Siebel-SSL-CA1.crt

     

    is Siebel-SSL-CA1.crt signed client certificate?

     

    • yes this certificate is provided by client. Today i did little trouble shooting and found that their was a chain of certificates. Then i downloaded them from links provided in certificates. I made a bundle of them and put it in Certificate authority in SSL client profile also put them in windows system and browser. Now only one problem is left. browser matches all the certificates but open ssl shows only one error that root certificate is self-signed. Root certificate will always be self-signed right because there is not certificate above it. Please help me out what to do now