Forum Discussion
SSL client profile, with client certificate auth, stopped working this week with Firefox 27.0 update
is anyone else suffering this very problem? all our Firefox users cannot log in to our website using their client certificates since 27.0 version, although they could with 26.0; (but this same version of Firefox can log in to other websites (not using BIG IP LTM) with the same certificate
we have a virtual server with a SSL client Profile with client certificates, using an iRULE we got from DevCentral to extract certificate fields, and that has been working perfectly (except with IE8) to date, but this last autoupdate of Firefox has let us in the dark
thanks in advance, Bernardo Riveira
17 Replies
- Bernardo_Riveir
Nimbostratus
the error that FireFox 27.0 shows is "ssl_error_handshake_failure_alert" - Bernardo_Riveir
Nimbostratus
and the version of LTM is 11.1 - Bernardo_Riveir
Nimbostratus
Workarounds!
it has to do with the new TSL 1.2 support in FireFox 27.0.
-
in the client, about:config allows you to change security.tls.version.max to something less than the default "3"; of course, this deactivates TLS 1.2 negotiation with every other web, so it is NOT ok (and forces you to ask the user to change things)
-
in the server, modifying the client SSL profile, adding (in advanced configuration) the "No TLSv1" option; that also is NOT OK, as SSL is insecure, old, blah blah... :)
is there any known bug with client certificate negotiation and TLS 1.2 support in F5 BIG-IP LTM?
-
- SKRUEGE3_85543
Nimbostratus
hello, my workaround: running socat on local client and connect to big-ip-management-interface using my local ip with firefox 27.
example: big-ip (ltm 3600 10.2.4): ip=10.10.10.200/16 client: ip=10.10.255.254/16 url: https://10.10.255.254:8443/
(insert following line into /etc/rc.local, so it starts on reboot automatically)
socat -lf /var/log/logfile_loba.log -L /var/run/lobal.lock -d -d TCP-LISTEN:8443,fork,bind=10.10.255.254 TCP-CONNECT:10.10.10.200:443
now you can use "https://10.10.255.254:8443/" AND add an (permanent) exception to firefox' database. if you still using windows gg, try cygwin with socat.
- Bernardo_Riveir
Nimbostratus
thank you, but, this is a public service (for thousands of users, we have about 250.000 customers); I'm afraid I cannot ask all of them firefox users to install a local proxy/tunnel, not even with cygwin :-) I mean, my problem is not connecting to the management interface of BIG-IP (I would use Chrome for that, after all), but to one of the virtual servers, accesible from all the internet - SKRUEGE3_85543
Nimbostratus
ok, that's true. sorry.
- SKRUEGE3
Nimbostratus
hello, my workaround: running socat on local client and connect to big-ip-management-interface using my local ip with firefox 27.
example: big-ip (ltm 3600 10.2.4): ip=10.10.10.200/16 client: ip=10.10.255.254/16 url: https://10.10.255.254:8443/
(insert following line into /etc/rc.local, so it starts on reboot automatically)
socat -lf /var/log/logfile_loba.log -L /var/run/lobal.lock -d -d TCP-LISTEN:8443,fork,bind=10.10.255.254 TCP-CONNECT:10.10.10.200:443
now you can use "https://10.10.255.254:8443/" AND add an (permanent) exception to firefox' database. if you still using windows gg, try cygwin with socat.
- Bernardo_Riveir
Nimbostratus
thank you, but, this is a public service (for thousands of users, we have about 250.000 customers); I'm afraid I cannot ask all of them firefox users to install a local proxy/tunnel, not even with cygwin :-) I mean, my problem is not connecting to the management interface of BIG-IP (I would use Chrome for that, after all), but to one of the virtual servers, accesible from all the internet - SKRUEGE3
Nimbostratus
ok, that's true. sorry.
- n0vac_65442
Nimbostratus
Same problem here. On-Demand Certificate Authentication no longer works with latest Chrome or Firefox. With Chrome, problem started after updating to version 33.0.1750.117. I think the security fix CVE-2013-6659 is the root cause to this problem:
"The SSLClientSocketNSS::Core::OwnAuthCertHandler function in net/socket/ssl_client_socket_nss.cc in Google Chrome before 33.0.1750.117 does not prevent changes to server X.509 certificates during renegotiations, which allows remote SSL servers to trigger use of a new certificate chain, inconsistent with the user's expectations, by initiating a TLS renegotiation."
That's exactly what's happening here with the Virtual Server that has certificate from public CA and Trusted Root chain from private CA for Client Certificate Authentication.
At least it definitely has something to do with TLS1.2 because disabling it in the ClientSSL profile "fixes" the problem. Any help?
- Simon_Hill_1215
Nimbostratus
I am experiencing exactly the same problem as n0vac - Chrome v33.0.1750.154 on Windows 8.1 and Windows 7 SP1. On-Demand Certificate authentication event causes ERR_SSL_PROTOCOL_ERROR - picking up the client cert as part of the initial SSL negotiation does not. NoTLSv1.2 option on the client SSL profile 'fixes' it. Simon. - n0vac_65442
Nimbostratus
I opened a case because of this problem. I hope they can find a solution for this.
- Thomas_Schocka1
Altocumulus
Hi,
I recently ran into a problem that had something to do with the SSL Handshake timeout value being changed from 60 seconds to 10 seconds, and a lot of browser-middleware couldn't handle that.
i.e. they open a connection, send the client hello, server replies with server hello and asks for cert, then the middleware kicks in to ask you the PIN etc, this "entering PIN procedure" probably takes more than 10 seconds, causing the F5 to reset the connection due to handshake timeout being 10 seconds.
Have you checked with a packet capture to see what is actually happening? Packets never lie! :)
Kind regards,
Thomas
- Benjamin_Cox_16
Nimbostratus
Does anyone have an update on this or know of a known bug? We are running firefox 3.0 and 11.3 BIG IP LTM and having this issue.
- Benjamin_Cox_16
Nimbostratus
make that firefox 30
- n0vac_65442
Nimbostratus
We fixed the problem by upgrading to 11.5.0 at the time. Support gave me following explanation:
"This is Bug alias 451003 Client authentication with Chrome TLSv1.2, LTM SSL sent signature algorithms SHA1-RSA, SHA256-RSA, SHA384-RSA and SHA512-RSA in certificate request message but only SHA1-RSA is supported.
We advertise more signature algorithms than we are able to support, then chrome select an algoritm that we do not actually support, ad we end the ssl handshake. Chrome seems to select sha256 by default with tls1.2, if the server advertises it is capable of it.
This is fixed in 11.5.0 or later and the solution would be to upgrade BIGIP to 11.5.0 or later."
- FF_129677
Nimbostratus
hello,
We had a similar case, however there is a parameter setting error in SSL Client Profile. Indeed, the certificate presented by the client belongs to an sub-authority and I checked only this one.
the problem is solved by adding a Certificate Bundle of the root authority and sub-authority.
Regards.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com