Forum Discussion

acurry583's avatar
acurry583
Icon for Altocumulus rankAltocumulus
Sep 06, 2018

Intermediate and certificate checks in BIG-IP LTM

Is there a functionality in the newer code for LTM that checks the Intermediate Certificate Chain and whether it checks the compatibility to a certificate? I know the newer code checks the certificate and key matching but does anyone know if this is capable for the chain and cert as a prevention method so that going into the CLI to check OpenSSL is not needed?

 

5 Replies

  • Hi,

     

    In fact now when you built your Client SSL Profile, F5 check that certificate and key matching. And it warn you with this following message:

     

    01070317:3: profile /Common/test's key and certificate do not match.

     

    but unfortunately F5 does not allow for the moment to control that the chain is valid. so if you put an invalid Chain, F5 does not indicate any error. You have to check it manuallay (SSLlabs, openssl or check in GUI).

     

    K20381201: Verifying a new CA signed SSL certificate

     

    Check using openssl or your browser

     

    Check Online using a site web

     

    You can also verify your configuration using GUI. Check that how issued your certificate then validate that the chain contained issuer...

     

    let me know if you need more details.

     

    regards

     

  • Can you please elaborate? Are you talking about validating a CA chain against an end-entity cert?

     

  • Hi, thanks Kevin, yes, I am speaking of validating the CA chain to the end certificate. For example, I apply a profile and the certificate and key match but the chain is wrong. i.e, Symantec_class_3_ev_ssl_g3 is placed but should be a _g4 CA. I know that I can check the chain via cli but I was looking for a quicker check. I have worked with Citrix Netscaler Loadbalancers previously and they will not allow you to place the incorrect chain with a cert. It will give you an error to say that the hash does not match. I am using a very old code 10.x and I would like to know if the newer codes perform such checks.