07-May-2020 01:24
07-May-2020 04:26
* Below irule will help you to know the Client request with TLS version but log will be forwarded to "/var/tmp/ltm"
when HTTP_REQUEST {
log local0. "Client address [IP::client_addr] and TLS version is [SSL::cipher version]"
}
* Max Supported TLS version is TLS1.3 in v14.x+ , however tls1.2 is secure and highly used for all applications
The BIG-IP system has the following SSL profile limitations:
07-May-2020 04:46
@Samir thanks for your help! I'm interested in TLS version info from Client side, mainly from ClientHello during SSL handshake between client and BigIP
07-May-2020 05:04
Please check below one if it helps.
when CLIENTSSL_CLIENTHELLO {
log local0. [IP::client_addr]
log local0. [SSL::cipher version]
}
Mayur
07-May-2020 05:12
Generally we see TLS/SSL renegotiation in ssldump. I don't think record-layer TLS version will display via iRule. I believe SSL debug has to enable to check or capture packet via ssldump..
08-May-2020 19:31
May we know what is the requirement here, this should be a troubleshooting via wireshark. The Client will always give the lowest supported protocol on the record layer and in the handshake protocol with the highest. There should not be any handshake failures because of record layer protocol.
If you still want it, you have to dissect the packets like below,
https://devcentral.f5.com/s/articles/advanced-irules-binary-scan-20453
10-May-2020 23:25
We are investigating a reported issue from our customer that they often receives Connection Reset after SSL Handshake. we suspect that it is related to the outdated version TLSv1.0/1 is being used by that customer either in TLS version for Record Layer or with the Max supported TLS version in the Client-Hello message itself