Forum Discussion
Andrei_Popiste1
Nimbostratus
Jan 17, 2011SSL serverside cipher mismatch
In a hardware-based 10.2(+HF2) LTM installation, LTM cannot negotiate cipher with an IIS6 server (ssldump reports a TCP close sequence after client hello).
Default https monitor reports TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA cipher negotiated with IIS; openssl s_client negotiate also the same cipher.
The symptom persists even if modifying ciphers used (tmm --servercipher 'ALL', and in server-ssl profile - several variations tried, from ALL to 'DEFAULT:EDH'). The IIS server configuration can't be modified. Any suggestions regarding cipher matching would be appreciate - devcentral articles, posts, askf5 SOLs already screened.
6 Replies
Sort By
- hoolio
Cirrostratus
Hi Andrei, - Andrei_Popiste1
Nimbostratus
Testing both (monitor & vs): default https monitor using DEFAULT:+SHA:+3DES:+kEDH succeeds with TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, server-side SSL handshake of VS fails (SERVERSSL_HANDSHAKE event never reached, ssldump shows only client (f5) hellos followed by real server's TCP FIN. - hoolio
Cirrostratus
The monitoring daemon, bigd, probably does not use the native TMM SSL stack. So I think you're right on it using the openssl ciphers. I'm surprised that using COMPAT (openssl ciphers) in the client SSL profile wouldn't work if the monitor succeeds. - Andrei_Popiste1
Nimbostratus
Thank you for the promptitude of your answer. - Andrei_Popiste1
Nimbostratus
It was server's certificate, namely Public Key Algorithm - after regenerating the real server certificate using Microsoft RSA SChannnel Cryptographic Provider (not Microsoft Base Cryptographic Provider), SSL handshake was successful. No cipher selection in schannel was required. For restricting cipher suites on Microsoft servers, http://support.microsoft.com/kb/245030. - hoolio
Cirrostratus
Hi Andrei,
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects