Forum Discussion
Stealth redirection of HTTPS
Hi Guys!
Would like to ask if the stealth redirection of a website possible in HTTPS example
http://f5.com/ss to https://f5.com/a
I will be able to view the content of https://f5.com/a but on my address bar I see is http://f5.com/ss
We can do stealth redirection with HTTP however not quite sure for https?
Thanks!
2 Replies
- IanB
Employee
What you're trying to do is exactly what the chain of trust that SSL uses to verify a website was designed to prevent.
I'm simplifying slightly, but when a certificate is issued for a website, it is signed by a trusted authority. That authority is deemed to be trusted because their root certificates are implicitly trusted by the browser. Geotrust, Digitrust, etc all have certificates that are pre-installed on every current operating system. In other words, when the website's certificate says it is valid for *.f5.com, that statement is signed by a chain of certifcates that end in one that the browser implicitly trusts.
Having said that, if you control the clients and have installed your certificate on them and told them to trust it as root CA, then you can set up a scenario where the BigIP is able to substitute the real website's certificate with one that it generated and signed on the fly, and the client will trust it because it trusts the signer.
We have a document which explains in more detail how it works, and how to configure it If you're interested, please take a look at our SSL intercept deployment guide
Note that if you were to deploy this without the trusted root certificate on the client, then any browser being directed through the service would alert the user that every https:// site's certificate could not be validated.
Hi Cathy,
after Ian's answer, I'm somewhat unsure if you need the stealth redirect in a forward proxy (aka. a Browser accesses the internet) or a reverse proxy scenario (aka. the internet access your web servers.
I you need the stealth redirect in a forward proxy scenario then Ian's answer would be the solution.
But if you need the silent redirect in a reverse proxy scenario, then you have to configure SSL-Termination of your Virtual:443, by assigning a Client- and Server-SSL-Profile. In this case the F5 can terminate and inspect the HTTPS request and then perform any kind of content manipulation.
Cheers, Kai
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
