handshake failed
2 TopicsF5 sends TCP RST after handshake
We just add new application to F5, but we got a random problem with connection. The TCP RST has been send to client by F5 after the handshake. We are on V 14.1.2.6. Have done few captures of the connection request, but no luck to get a valid reason for the reset. Connection from windows: got TCP RST after the handshake Connection from linux: always fine412Views0likes0Commentsirule that presents certificate doesn´ t run in TLSv1.3
Hi, since last update google chrome and MD edge (chromium based), clients start tunel https with TLSv1.3, and I have a irule that presents and accepts a certificate, with TLSv1.2 runs Ok, but with TLSv1.3 appears a handshake SSL fail. Another SSL profiles without irule, with only TLSv1.3, is Ok (BIGIP version 15.1.x and 16.1.x LTM) A known issue related to ML-KEM post-quantum TLS key exchange, which has recently become supported in the following browser versions: Google Chrome 131. Microsoft Edge 131.0.2903.48 (Stable). Mozilla Firefox 132.0. Technical Tip: ERR_SSL_PROTOCOL_ERROR a known issue related to ML-KEM post-quantum TLS key exchange, which has recently become supported in the following browser versions: Google Chrome 13... IRULE is same like this (when user puts in browser https://www.something/web/ in browser appears a choice with many certificates to choose one and then connect with the virtual server) : when CLIENT_ACCEPTED { set needcert 0 set gotcert 0 set serror 0 } when HTTP_REQUEST { #log local0. "HTTP_REQUEST" if { $gotcert == 0 and [HTTP::uri] contains "/web/" } { HTTP::collect SSL::cert mode request SSL::renegotiate set needcert 1 #log local0. " ($needcert)" } else { SSL::cert mode ignore #log local0. "" } } when CLIENTSSL_HANDSHAKE { #log local0. "" #log local0. " count is ([SSL::cert count]) and result is =([SSL::verify_result])" if { [SSL::cert count] == 0 or [SSL::verify_result] != 0 } { #log local0. "Bad cert! " #log local0. "needcert es $needcert" if { $needcert == 1 } { #reject set serror 1 HTTP::release } } else { #log local0. "Good cert!($needcert)" set gotcert 1 if { $needcert == 1 } { HTTP::release #set c_cert [SSL::cert 0] set c_cert [X509::whole [SSL::cert 0]] } } } when HTTP_REQUEST_SEND { #log local0. "HTTP_REQUEST_SEND..." clientside { if { [info exists c_cert] } { #log local0. "Certificado es $c_cert" #HTTP::header insert X-Client-Cert [b64encode $c_cert] HTTP::header insert SSL_CLIENT_CERT $c_cert #log local0. "" } else { if { $serror == 1 } { } } } } I need help! thanks a lot.80Views0likes1Comment