Forum Discussion
goyogi
Nimbostratus
Mar 16, 2010SSL verification
We do SSL offloading on the LTM but some of our sites are built to detect if the connection is coming in encrypted or not. We would rather not re-encrypt it back to the server for several reasons. I was wondering if there is an industry standard or best practice to inject something into the header that would tell the server this come in securely? Something standard similar to XFF?
The application is .asp and they are using SERVER_PORT_SECURE currently.
http://www.w3schools.com/asp/coll_servervariables.asp
Thank you for your advice!
- mazek_59373
Nimbostratus
I just put additional header in each decrypted request, sth like "X-HTTPS: 1". You might want to remove that header before You put Yours to avoid double X-HTTPS headers after appending Yours. - hoolio
Cirrostratus
Maz's suggestion is a nice simple one. If you configure a custom HTTP header with the header to remove set to 'X-HTTPS' and the header to insert as 'X-HTTPS: 1' you can prevent someone from inserting their own X-HTTPS header and do this without an iRule. - Justinian_48178
Nimbostratus
Would you guys do this through a custom iRule or by custom http profile(s)? We currently inject FRONT-END-HTTPS: on for our secure sites, but we found out that if the client injects that header, we accept it and send them as if they are secure. - hoolio
Cirrostratus
Your method is what I would have done. Using two custom HTTP profiles--one for HTTP which removes the header and one for HTTPS that removes and then inserts the header--should be the most efficient way to handle the scenario.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects