Bug ID 449770: Using "CRYPTO::keygen -alg rsa" outside of RULE_INIT can cause TMM to time out

Last Modified: Apr 28, 2025

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.5.1, 11.5.1 HF1, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.1 HF10, 11.5.1 HF11, 11.5.2, 11.5.2 HF1, 11.5.3, 11.5.3 HF1, 11.5.3 HF2, 11.5.4, 11.5.4 HF1, 11.5.4 HF2, 11.5.4 HF3, 11.5.4 HF4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10

Opened: Feb 20, 2014

Severity: 2-Critical

Symptoms

RSA key generation is a time consuming process. Placing a key generation request in an event that is fired frequently can cause TMM to stop responding.

Impact

TMM is killed by SOD.

Conditions

Use CRYPTO::keygen in an event such as CLIENT_DATA or HTTP_REQUEST

Workaround

Move key generation to RULE_INIT.

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips