Forum Discussion
SSL Ciphers
Hi, I'm working on a task to disable SSLv2 connection. I'm going to use NATIVE SSL stack and COMPAT SSL stack and the following command in client profile.
native:compat:!sslv2
If I'm using both NATIVE and COMPAT SSL stack which SSL stack does the client chose to communicate?
If a client is currently using SSLv2 and we deny the request on LB, Does the client re-initiate the session with SSLv3 or TLS?
Does the security certificate which we are installing on LB have any algorithm related to SSLv2 or SSLv3 or TLS?
Regards, Thiyagu
4 Replies
- nathe
Cirrocumulus
Thiyagu,
"If I'm using both NATIVE and COMPAT SSL stack which SSL stack does the client chose to communicate?"
It should negotiate the most secure cipher from either list, which will probably be from the NATIVE stack. To be certain you can add @STRENGTH to your cipher string.
"If a client is currently using SSLv2 and we deny the request on LB, Does the client re-initiate the session with SSLv3 or TLS?"
The existing session would continue as normal but any new TCP connections over SSL would negotiate with SSLv3 and upwards.
"Does the security certificate which we are installing on LB have any algorithm related to SSLv2 or SSLv3 or TLS?"
It doesn't include protocol supportability no.
Moving forward f5 are moving away from COMPAT ciphers as they are less secure and slower (can't be optimised in hardware) and SSLv3 now. I'd recommend you look further ahead than just SSLv2.
Hope this helps,
N
- Thiyagu_163984
Nimbostratus
Thanks Nathan. I have one more query. Would you please help me to know when the ciphers comes into play of the SSL communication between client and the server?
Regards, Thiyagu
- nathe
Cirrocumulus
It's all in the SSL Handshake when the client and server negotiate the security of the SSL transaction.There's an excellent series of tech tips by Jason Rahm here: https://devcentral.f5.com/s/articles/ssl-profiles-part-1....mark up if happy
- Brad_Parker
Cirrus
Any particular reason you want to use COMPAT? It is most likely unnecessary. Stick with the NATIVE stack.
will show you what ciphers will be available with your configured cipher string.tmm --clientciphers ''
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com