Advanced Threat Mitigations via SSL Intercept
SSL offload has been around for quite some time. But this technology was primarily developed for the web farm audience, offloading SSL traffic from the application servers and putting the load on app...
Published Feb 23, 2016
Version 1.0JRahm
Admin
Christ Follower, Husband, Father, Technologist. I love community and I especially love THIS community. My background is networking, but I've dabbled in all the F5 iStuff, I'm a recovering Perl guy, and am very much a python enthusiast. Learning alongside all of you in this accelerating industry toward modern apps and architectures.JRahm
Admin
Christ Follower, Husband, Father, Technologist. I love community and I especially love THIS community. My background is networking, but I've dabbled in all the F5 iStuff, I'm a recovering Perl guy, and am very much a python enthusiast. Learning alongside all of you in this accelerating industry toward modern apps and architectures.candc
Cirrus
Jul 27, 2017How well does this work for pinned (HPKP) certificates.
Is it simply as straightforward as having the BIGIP remove or rewrite the
Public-Key-Pins(-Report-Only)
header in HTTP_RESPONSE
, to one that is in line with the certs generated by your BIGIP?
I presume that, if you are implementing this in an environment that has already received some
Public-Key-Pins
, you are at the mercy of the existing max-age
of those values, unless you can also influence the resetting of browser state amongst your users?