Bug ID 451041: Session ticket may not be parsed correctly when using SSL persistence

Last Modified: Jul 12, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.3.0, 11.4.1, 11.5.0

Fixed In:
11.6.0, 11.5.1, 11.4.1 HF9

Opened: Mar 03, 2014

Severity: 2-Critical

Related Article: K15674

Symptoms

When using SSL persistence with session tickets, the session ticket may not be parsed correctly causing the SERVERSSL_HANDSHAKE event to not be triggered.

Impact

Expected TCL events might not happen.

Conditions

SSL persistence is configured and using session tickets.

Workaround

Do not use server-side session tickets.

Fix Information

The parsing of session tickets is now correct, and the expected TCL events are fired.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips