Forum Discussion

Andrei_Popiste1's avatar
Andrei_Popiste1
Icon for Nimbostratus rankNimbostratus
Jan 17, 2011

SSL serverside cipher mismatch

In a hardware-based 10.2(+HF2) LTM installation, LTM cannot negotiate cipher with an IIS6 server (ssldump reports a TCP close sequence after client hello).

 

 

Default https monitor reports TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA cipher negotiated with IIS; openssl s_client negotiate also the same cipher.

 

 

The symptom persists even if modifying ciphers used (tmm --servercipher 'ALL', and in server-ssl profile - several variations tried, from ALL to 'DEFAULT:EDH'). The IIS server configuration can't be modified. Any suggestions regarding cipher matching would be appreciate - devcentral articles, posts, askf5 SOLs already screened.

 

6 Replies

  • Hi Andrei,

     

     

    Are you testing an issue with an HTTPS monitor or load balanced traffic through a VS or both? Does the monitor succeed with TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA?

     

     

    Can you try using the insecure ciphers server SSL profile just to test?

     

     

    sol11624: Change in Behavior: The default BIG-IP SSL profiles no longer include DES-CBC-SHA and ciphers containing the MD5 hash

     

    http://support.f5.com/kb/en-us/solutions/public/11000/600/sol11624.html

     

     

    sol11631: SSL ciphers used in the clientssl-insecure-compatible and serverssl-insecure-compatible SSL profiles

     

    http://support.f5.com/kb/en-us/solutions/public/11000/600/sol11631.html

     

     

    Aaron
  • Testing both (monitor & vs): default https monitor using DEFAULT:+SHA:+3DES:+kEDH succeeds with TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, server-side SSL handshake of VS fails (SERVERSSL_HANDSHAKE event never reached, ssldump shows only client (f5) hellos followed by real server's TCP FIN.

     

     

    In server SSL profile used for vs I tried several combinations: DEFAULT:+EDH, COMPAT, ALL - with ALL, only

     

    TLS_DHE_RSA_WITH_AES_128_CBC_SHA

     

    TLS_DHE_RSA_WITH_AES_256_CBC_SHA

     

    TLS_DHE_RSA_WITH_DES_CBC_SHA

     

    TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA

     

    TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA

     

    are sent from f5 to server. I tried also the default serverssl-insecure-compatible.

     

     

    I wonder if default monitor is implemented using openssl libraries.
  • The monitoring daemon, bigd, probably does not use the native TMM SSL stack. So I think you're right on it using the openssl ciphers. I'm surprised that using COMPAT (openssl ciphers) in the client SSL profile wouldn't work if the monitor succeeds.

     

     

    It might be worth opening a support case on this as they'll be able to test directly with you.

     

     

    Aaron
  • Thank you for the promptitude of your answer.

     

     

    tmm --serverciphers 'COMPAT' | grep DHE returns only DHE-RSA-, not DHE-DSS-.

     

     

    Since I have no access to server, I suspect that real server's certificate was issued using stock Microsoft Base CSP not Microsoft RSA SChannnel Cryptographic Provider.

     

     

    Thank you for your time and support.
  • It was server's certificate, namely Public Key Algorithm - after regenerating the real server certificate using Microsoft RSA SChannnel Cryptographic Provider (not Microsoft Base Cryptographic Provider), SSL handshake was successful. No cipher selection in schannel was required. For restricting cipher suites on Microsoft servers, http://support.microsoft.com/kb/245030.

     

  • Hi Andrei,

     

     

    That's good to know. Thanks for posting the solution.

     

     

    Aaron