Bug ID 442555: ECDSA SSL handshakes can fail on 2xxx/4xxx systems

Last Modified: Apr 10, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP APM, LTM(all modules)

Known Affected Versions:
11.5.1, 11.5.1 HF1, 11.5.1 HF10, 11.5.1 HF11, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.2, 11.5.2 HF1, 11.5.3, 11.5.3 HF1, 11.5.3 HF2, 11.5.4, 11.5.4 HF1, 11.5.4 HF2, 11.5.4 HF3, 11.5.4 HF4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9

Fixed In:
11.6.0

Opened: Jan 09, 2014
Severity: 3-Major
Related AskF5 Article:
K20152235

Symptoms

In some circumstances, ECDSA signatures are not properly processed by the BIG-IP 2xxx/4xxx crypto hardware during verification, causing SSL handshakes with ECDSA cipher suites to fail.

Impact

SSL handshake failure.

Conditions

SSL handshake using ECDSA cipher suite on a 2xxx/4xxx system.

Workaround

None.

Fix Information

ECDSA signatures are now properly processed by the BIG-IP 2xxx/4xxx crypto hardware.

Behavior Change