Forum Discussion
madi_56757
Nimbostratus
Apr 27, 2005verifying ssl encryption
Hello
Is it possible to verifying in a irule the client encrypton of ssl
The problem is i will configure a VIP to terminate the SSL (443)
and if the encryption greater as 128bit then use the POOl bigger
and if the encryption lower as 128 bit redirect to "sorry_server"
have this anyone to do wife the
SSL::cipher version
SSL::cipher bits
Thanks
madi
- Sure this is possible. In fact, there's a sample over in CodeShare (Click here) titled
when HTTP_REQUEST { get encryption strength set strength [SSL::cipher bits] if { $strength >= 128 } { pool web_servers } else { Now use one of the destination commands Either specify a pool pool sorry_servers or to a specific node node 10.10.10.10 or redirect to a specific URL HTTP::redirect http://some_address/sorry.html } }
- Dayton_Gray_103
Nimbostratus
Do you have to do this via iRule? Is there any way to reject lower than 128bit encryption in the SSL profile setting? - hoolio
Cirrostratus
Sure, you can do this with the cipher spec on the client SSL profile as described in SOL7815 (Click here). However, Joe's suggestion of an iRule is a more graceful way of letting the client know why they can't access the VIP. - Thomas_Schaefer
Nimbostratus
I know this is an old thread, but I have a specific question about it. I setup a test with a tool called THCSSLCheck. It basically lists the ciphers that the server supports. This is similar to when the site is scanned by our infosec folks and they report to us that a site supports keys less than 128 bits. The issue is that I created an iRule to redirect users to apage to tell them why we are rejecting the session. It appears that the SSL session must already be established as even with this iRule, the scanner still shows us accepting the weak keys. Is it possible to have an iRUle look at the cipher bits and not complete the SSL session if the cipher is not at least 128 bits. Note that the iRule works just fine and the redirect works, but I will still end up getting scanner results that show it supported. Note that is I reject the connection in CLIENTSSL_HANDSHAKE I get the same behavior as if I disabled the weak ciphers in the profile. I guess I want it both ways in that I want to reject the SSL session but I also want to send a redirect. - hoolio
Cirrostratus
Hi Tom, - Thomas_Schaefer
Nimbostratus
Aaron,
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects