Bug ID 1148181: SSL TLS1.3 connection terminates with "empty persist key" error when SSL persistence is enabled and session tickets are disabled

Last Modified: Dec 05, 2024

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
16.0.0, 16.0.0.1, 16.0.1, 16.0.1.1, 16.0.1.2, 16.1.0, 16.1.1, 16.1.2, 16.1.2.1, 16.1.2.2, 16.1.3, 16.1.3.1, 16.1.3.2, 16.1.3.3, 16.1.3.4, 16.1.3.5, 16.1.4, 16.1.4.1, 16.1.4.2, 16.1.4.3, 16.1.5, 16.1.5.1, 17.0.0, 17.0.0.1, 17.0.0.2, 17.1.0, 17.1.0.1, 17.1.0.2, 17.1.0.3, 17.1.1, 17.1.1.1, 17.1.1.2, 17.1.1.3, 17.1.1.4, 17.1.2

Opened: Sep 09, 2022

Severity: 3-Major

Symptoms

SSL TLS1.3 handshake fails.

Impact

TLS1.3 SSL handhshakes will fail.

Conditions

- clientssl profile has TLS1.3 enabled - clientssl profile has session ticket disabled - virtual server has SSL Persistence profile applied

Workaround

Either disabling persistence in the virtual server or enabling session-ticket in the clientssl profile

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips