Forum Discussion
SSL Handshake Error
Hello, I'm fairly new to F5 but have unfortunately been tasked with updating all network connections to TLS 1.2 (only) To that end I'm simply trying to put a SSL enabled LTM Virtual Server in front of an existing server. While a non-SSL LTM is working fine, when I use an SSL connection I receive the following errors: Feb 10 13:26:54 xxxx debug tmm1[6387]: 01260009:7: Connection error: ssl_null_parse:2667: record length too large (22) Feb 10 13:26:54 xxxx info tmm1[6387]: 01260013:6: SSL Handshake failed for TCP x.x.x.x:9200 -> x.x.x.x:3923 this is in the ltm log. Anyone at F5 or expert in this technology have a possible remedy or idea about these?
Thanks in advance Matt
6 Replies
- Kevin_Stewart
Employee
Is this client side or server side SSL? In other words, is the SSL from a client to the BIG-IP, or from the BIG-IP to the server?
- MattEWS_248690
Nimbostratus
Thank you for the reply, best I can tell from Fiddler is that we're successfully establishing a tunnel to the BIG-IP appliance and the error is from the appliance to the server. I'm 99% sure its the second scenario - BIG-IP to the server. Thank You
- Kevin_Stewart
Employee
Okay, so here's what concerns me.
SSL Handshake failed for TCP x.x.x.x:9200 -> x.x.x.x:3923So, a few additional questions:
-
Do you intend to re-encrypt to the servers? The connection between the BIG-IP and server?
-
If so, do you have a server SSL profile applied to the VIP?
-
Is the server really listening on the above port, and expecting SSL?
-
- MattEWS_248690
Nimbostratus
1.) Yes, that connection must also be encrypted and is intentional 2.) Yes. The only enabled 'Options' are "Don't insert empty fragments" 3.) Yes it is - I can hit that server directly with success. We think this might be a CIPHER mis-match (our server SSL profile is set to DEFAULT and we're trying to connect via TLS 1.2 only)
- Kevin_Stewart
Employee
Not sure which LTM version you're on, but server side TLS1.2 is supported in most platforms. There's a couple of things I'd try next:
-
Open an SSH connection to the BIG-IP and issue an openssl s_client command to the server
openssl s_client -connect x.x.x.x:9200What do you see? Does it succeed or fail? Does it indicate that Secure Renegotiation is enabled? If it fails, then you may have some unique TLS protocol or cipher requirements.
-
Start an SSLDUMP capture on this internal interface
ssldump -AdNn -i [internal VLAN name] port [encryption port]ssldump will show you the SSL handshake process and, hopefully, where the handshake is failing
-
- MattEWS_248690
Nimbostratus
We'll take that route - thank you Kevin I'm a F5 noob (no idea how I got tasked with this) so your direction is much appreciated. R/ Matt
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
