Technical Forum
Ask questions. Discover Answers.
cancel
Showing results for 
Search instead for 
Did you mean: 

Disabling Specific Weak Cipher Suites

paragon
Altostratus
Altostratus

I need help disabling specific cipher suites for a client. I've read the documentation but don't know enough about these chipher suites to come up with the correct string to disable them in the SSL profile.

Part two of my question is, what this impacts. Does this impact the suites used from F5 to the server or just the connection between client and F5 or both?

These are the cipher suites being deprecated on the server side behind F5:

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) ECDH secp384r1 (eq. 7680 bits RSA) FS WEAK

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) ECDH secp384r1 (eq. 7680 bits RSA) FS WEAK

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) ECDH secp384r1 (eq. 7680 bits RSA) FS WEAK

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) ECDH secp384r1 (eq. 7680 bits RSA) FS WEAK

TLS_RSA_WITH_AES_128_GCM_SHA256 (0x9c) WEAK

TLS_RSA_WITH_AES_128_CBC_SHA (0x2f) WEAK

TLS_RSA_WITH_AES_256_CBC_SHA (0x35) WEAK

Thanks!

Zach

1 ACCEPTED SOLUTION

This would the server side SSL profile then. Usually be default a generic SSL profile is used on server side, but you can create a specific one for this particular application.

Now, there is one more concern. You can disable the ciphers on the server and don't have to on the F5. Why? Both the F5 and server need to both support and agree upon a cipher version. So if the server is not presenting it as available in the initial handshake, the F5 simply will not use/select it. That said... have you asked the server team what ciphers are still supported? You want to make sure the F5 supports what the server is requesting now... newer versions of BIG-IP support newer ciphers, so maybe a newer software BIGIP version may be needed to support what the servers now advertise.

View solution in original post

6 REPLIES 6

Paulius
MVP
MVP

@paragon Sadly I don't know the string off the top of my head to disable these specific ciphers but you can use the following article to configure the exact ciphers that you need to use. Making this change will change the ciphers where you configure that cipher group only and not the entire F5. If you figure out what cipher string will disable these ciphers specifically then that would change the ciphers used for all virtual servers using the SSL client profile.

https://my.f5.com/manage/s/article/K10866411

Thanks @Paulius ! That article is helpful, I didn't see that one in my searches. Apreciate the help.

whisperer
Cumulonimbus
Cumulonimbus

Which ciphers are you looking to disable? You mentioned which are F5 deprecated, but did not indicate what you want to use?

You can modify the SSL negotiation process on either the client or server side, using the respective profiles. Usually on the client side, you want to use secure EC ciphers, high encryption, etc. Probably want to disable older SSLvX and earlier TLS. On the server side, this is generally less critical of you are proxying the connection via the F5 BIG-IP. Many times times servers are old and application teams are loath to upgrade, either their OS or software. So, more insecure ciphers are usually used on the server side as a workaround, but then on the client side, accessible to users, you enforce the stronger suites.

 

 

@whisperer I'm looking to disable the ciphers in the list above on the server side. The application no longer supports them and F5 is unable to communicate with the app server when the ciphers are removed from the server. Is there an SSL profile specific to the server side? Sorry, I don't have access to F5 and trying to walk our client through this. I think they were trying to edit the SSL profile for the domain at Local Traffic > Profiles SSL Client.

This would the server side SSL profile then. Usually be default a generic SSL profile is used on server side, but you can create a specific one for this particular application.

Now, there is one more concern. You can disable the ciphers on the server and don't have to on the F5. Why? Both the F5 and server need to both support and agree upon a cipher version. So if the server is not presenting it as available in the initial handshake, the F5 simply will not use/select it. That said... have you asked the server team what ciphers are still supported? You want to make sure the F5 supports what the server is requesting now... newer versions of BIG-IP support newer ciphers, so maybe a newer software BIGIP version may be needed to support what the servers now advertise.

Ok, this is starting to make more sense to me. Thank you! I have the supported list of ciphers from the server team so it sounds like none of the supported ciphers are available in that defaul ssl profile used on the server side and that's why it can't negotiate a connection when they remove the weak ciphers. I'll help them find the correct profile and verify this theory. Sounds like we'll just need to assign a profile on the server side that has supported ciphers available. I see some of the supported ciphers on the client side using the Qualsys SSL checker so I assume there would have to be some available ciphers on BIGIP version they are using. And the link @Paulius sent looks like it covers setting up a new profile with specific ciphers. Hopefuly I can help them sort this out this afternoon. Thank you both so much for your help!