Bug ID 700057: LDAP fails to initiate SSL negotiation because client cert and key associated file permissions are not preserved

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.5.4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5

Fixed In:
14.0.0, 13.1.0.6, 12.1.3.6, 11.6.4

Opened: Dec 27, 2017

Severity: 3-Major

Symptoms

After upgrading to an affected build, the default key will have incorrect group ownership.

Impact

File permissions are not preserved in the .ucs file. The httpd process will not be able to use the default key, so anything using it will fail.

Conditions

Upgrade or load a .ucs with SSL keys configured.

Workaround

Run the following two commands: tmsh save /sys config tmsh load /sys config

Fix Information

The system now preserves correct permissions for default.key across upgrade and ucs load.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips