OpenSSL HeartBleed, CVE-2014-0160
Get the latest updates on how F5 mitigates HeartbleedGet the latest updates on how F5 mitigates Heartbleed
The Heartbleed attack in OpenSSL 1.0.1 and beyond allows an attacker to get up to 64k of process data from a TLS heartbeat response. The 64k of data will quite often contain sensitive information such as keys or passwords. There are quite a few exploits in the wild already for this attack.
F5 has analyzed this attack and we are pleased to say that BIG-IP data traffic using an SSL profile with default ciphers is not vulnerable to this attack. BIG-IP SSL profiles terminate the SSL traffic on the BIG-IP, so the malicious heartbeat never gets to your webservers. TLS heartbeats are not enabled on current versions of BIG-IP, so any virtual server protected by an SSL profile is not vulnerable.
However, if you are not using the SSL termination capabilities of the BIG-IP, then the attack will pass directly through the BIG-IP and to the webservers. You may be vulnerable depending on the webservers you use.
BIG-IP versions 11.5.0 and 11.5.1 do use OpenSSL 1.0.1 for the management GUI and are vulnerable to the attack. Versions of BIG-IP older than 11.5 are not vulnerable.
F5 encourages using a private management network that is not connected to the internet.
A hotfix is available for the management GUI.
Get the latest updates on how F5 mitigates Heartbleed
See the AskF5 solution for more information.
A mitigation for virtual servers that do not use SSL termination
If you are using a simple load balancing virtual server without an SSL profile, then the traffic is passing directly to your webservers.
My great F5 colleagues and I have written an iRule that mitigates this vulnerability when the client sends a heartbeat. Since we haven't seen a valid client that sends heartbearts, we like this solution. If you have clients that do send valid heartbeats, then we have an iRule that watches for large heartbeat responses and kills the connection before they are sent to the client.
- Byron_Ater_1504NimbostratusFound that the following version 10.2.1 is not vulnerable as it does not look for a hearbeat
- Faruk_GrozdanicHistoric F5 AccountF5 LineRate Application Proxy product is not vulnerable by this bug as it uses openSSL version 0.9.8. Users could confirm this by entering bash shell and executing 'ssh -V' which will list openssl library version used by the system.
- tabernarious_11NimbostratusFor those using Edge Client you should know about its vulnerability:
- opediggitty_692NimbostratusWhen you say
- JRahmAdminhe is saying that if you are not offloading ssl, but simply load balancing ssl traffic back to servers that are offloading, then the vulnerability would need to be addressed at the servers themselves.
- Joel_MosesNimbostratusIt should be noted that although Edge Client is linked to a vulnerable version of OpenSSL, it's nowhere near as risky as use of the same library on a server process which is actively listening all the time. In a client scenario, the listener must actively connect to a malicious server, and in the case of Edge Client, that possibility is remote (unless you're the type of person that blindly configures your VPN client to connect to just any 'ol server hostname that people send you).
- What_Lies_Bene1CirrostratusCan the article be updated to state that there are now fixes for all of the TMOS/LTM vulnerabilities?
- obatkeputihan_3Nimbostratus
reviews of interest to a reference source for http://jualspreiantiair.com