We are planning to upgrade BIG-IP 13.x to 14.x, but if we upgrade to 14.x, users will ge popup of "Revocation information for the secuirty certificate for theis site is not available. Do you want to proceed?"
From F5 support, we got advince that if Internet option "Check for server certificate revocation" is disabled, the popup can be avoided. It surely can be avoided with it, but many of our user uses unmanaged hardened device and users cannot change internet option settings.
On the VS, private server certificate is used. All deivces has corresponding client certificate. We import CRL from private CA every half hour by using follwoing command line on BIG-IP.
tmsh modify /sys file ssl-crl [CRL name] source-path [URL for CRL]
I guess that the popup is shown because it is private certificates. THe popup can be avoided by some setting on BIG-IP side?
For DYNAMIC CRL
if you want to use external proxy server for forwarding the CRL request to the CRL server.
1. Crate DNS Resolver (Network-->DNS Resolvers-->DNS Resolver List-->Create)
2. Open DNS Resolver created in step 1, go to "Forward Zones" tab and add appropriate zones with DNS servers.
3. Create an internal proxy (GUI-->System-->Services-->Internal Proxies-->Create)
Assign DNS Resolver created in step 1 (no external proxy) or enable "Use Proxy Server" and specify LTM pool with proxy server (external proxy server).
4. Create Traffic Certificate Management CRL object (GUI-->System-->Certificate Management --> Traffic Certificate Management --> CRL)
Assign internal proxy created in step 3.
5. Assign CRL object created in step 5 to Client SSL profile with client authentication enabled:
Open GUI-->Local Traffic-->Profiles-->SSL-->Client-->profile_name
Go to Client Authentication section and set:
Client Certificate to request/require this will enable client authentication
Trusted Certificate Authorities to CA that you want to trust
CRL to object created in step 2.
Include root certificates to Advertised and Trusted bundle
From v15.1 onwards client SSL profiles support CRL validator objects as per this bug report:
In F5 in the client SSL profiles , please search for the following setting:
|Notify Certificate Status to Virtual Server||Introduced in BIG-IP 13.0.0, this option specifies whether to propagate the status of the certificates associated with this client SSL profile to the virtual servers that are using this client SSL profile. Disabled by default.
Note: This option is used to communicate SSL certificate revocation status to the virtual server. This is typically implemented in conjunction with an OCSP stapling configuration.
This option is disabled by default.
You have to enable it on your CLIENT SSL profile by checking the option button
For that you have to import the CRL list and then apply that to the CRL option in the CLIET SSL profile
For STATIC CRL
Having a CRL loaded as a local file into the BIGIP is probably the easiest way to get it to check a CRL since you are avoiding the use of MS Enterprise/Datacenter Servers with OCSP. I also had various issues that the F5 tech support could not explain with CRLDP and MS cert services. So the CRL is an easy fix for a lab environment. I also could not find the proper method to do this in the online knowledge-base for F5’s product either.
For starters, you need to get a copy of the CRL from your MS Certificate Server.
Load the CRL to the BIGIP
Now that the CRL is imported, it can be used in any SSL Client Profile in the Certificate Revocation List (CRL) Dropdown.
This CRL is static. Any newly revoked certs on the MS Server will, of course, not be seen by the F5 until the CRL file