Sam_D_
May 07, 2020Altostratus
TLS versions in ClientHello
I'm wondering how I can read TLS versions such as TLS version in Record Layer and the Max supported TLS version from ClientHello message by using:
when CLIENTSSL_CLIENTHELLO {
}
I'm wondering how I can read TLS versions such as TLS version in Record Layer and the Max supported TLS version from ClientHello message by using:
when CLIENTSSL_CLIENTHELLO {
}
* Below irule will help you to know the Client request with TLS version but log will be forwarded to "/var/tmp/ltm"
when HTTP_REQUEST {
log local0. "Client address [IP::client_addr] and TLS version is [SSL::cipher version]"
}
* Max Supported TLS version is TLS1.3 in v14.x+ , however tls1.2 is secure and highly used for all applications
The BIG-IP system has the following SSL profile limitations:
@Samir thanks for your help! I'm interested in TLS version info from Client side, mainly from ClientHello during SSL handshake between client and BigIP
Please check below one if it helps.
when CLIENTSSL_CLIENTHELLO {
log local0. [IP::client_addr]
log local0. [SSL::cipher version]
}
Mayur
Generally we see TLS/SSL renegotiation in ssldump. I don't think record-layer TLS version will display via iRule. I believe SSL debug has to enable to check or capture packet via ssldump..
May we know what is the requirement here, this should be a troubleshooting via wireshark. The Client will always give the lowest supported protocol on the record layer and in the handshake protocol with the highest. There should not be any handshake failures because of record layer protocol.
If you still want it, you have to dissect the packets like below,
https://devcentral.f5.com/s/articles/advanced-irules-binary-scan-20453
We are investigating a reported issue from our customer that they often receives Connection Reset after SSL Handshake. we suspect that it is related to the outdated version TLSv1.0/1 is being used by that customer either in TLS version for Record Layer or with the Max supported TLS version in the Client-Hello message itself