Forum Discussion
The remote server's SSL certificate has already expired - Plugin ID 15901
Hi Experts
We are running Nessus Scan against our F5 BIG-IP LTM devices and getting following alert:-
The remote server's SSL certificate has already expired - Plugin ID 15901
Now problem is that we are using IP address to logon to these devices instead of a common name (CN) which is used by SSL certs. We can`t remove it for sure. Now how to regenerate it without a common name (CN) is a concern for us ?
Some of the information from F5:-
http://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/tmos_management_guide_10_1/tmos_device_certif_config.html1019303
Here is our cert information:-
General Properties Name server Certificate Subject(s) My Company Ltd
Certificate Properties Expires Jan 16, 2013 Version 3 Serial Number XXXX Subject Common Name:
Organization: My Company Ltd Division:
Locality: Yes State Or Province: No Country: YO Issuer Self
Any advice will be highly appreciated.
Thanks
- Cory_50405Noctilucent
It may be that Nessus is assuming an expired certificate if it receives a mismatch between the CN of the certificate and the URL it used to access the LTM. As long as your certificate on the interface is still valid (whether it's a custom certificate or a self-signed should not matter), then this is a false positive finding.
- Cory_50405NoctilucentYou got a permission denied error because your syntax was trying to execute it. Your cat should be fine, except grep for HTTPD (all caps). It is case sensitive.
- khiali_130513NimbostratusI mised up 2 questions, just updated the relevant one. Regardding this, we are accessing LTM via IP address only. No CN. How will I know if th ecertificate is valid on the interface or not. All I know that its expired.
- Cory_50405NoctilucentCorrect. So the Nessus finding should only be a real finding if the certificate you have loaded on the management interface is actually expired. Otherwise, it's a false positive. Doesn't matter which CA (or self signed), since you accessing by IP address.
it should not matter if the certificate has a common name or not, i dont believe you cant create one without even. if the nessus scan only mentions the expired part and if you want to fix this, you could also just say we know. then just a new certificate with any common name should be fine. do keep in mind this certificate might also be used for the HA device trust. and with GTM it might be even more important.
- Vitaliy_SavransNacreous
Using of fqdn for accessing LTM devices is not depends on CN in certificates. For this you need appropriate dns records, ideally it must match with CN.
- khiali_130513NimbostratusI have checked and the management IP addresses doesn`t resolve to any DNS records. Now I could be wrong here.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com