Bug ID 490936: SSLv2/TLSv1-based handshake causing handshake failures

Last Modified: Oct 01, 2018

Bug Tracker

Affected Product:  See more info
BIG-IP All(all modules)

Known Affected Versions:
11.5.1, 11.5.1 HF1, 11.5.1 HF10, 11.5.1 HF11, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.2, 11.5.2 HF1, 11.5.3, 11.5.3 HF1, 11.5.3 HF2, 11.5.4, 11.5.4 HF1, 11.6.0, 11.6.0 HF1, 11.6.0 HF2, 11.6.0 HF3, 11.6.0 HF4, 11.6.0 HF5, 11.6.0 HF6, 11.6.0 HF7, 11.6.0 HF8, 11.6.1

Fixed In:
11.6.1 HF1, 11.5.4 HF2

Opened: Nov 14, 2014
Severity: 3-Major

Symptoms

You are experiencing SSL handshake failures. There are error messages in /var/log/ltm similar to the following: tmm[16895]: 01260009:7: Connection error:9044: invalid pre-master secret (40)

Impact

SSL connection unable to establish; error generated. Note: This occurs only for clients that send SSLv2 or TLSv1 in the CLIENTHELLO.

Conditions

-- Client SSL profiles configured. -- Client sends a CLIENTHELLO containing a SSLv2 or TLSv1 version in the handshake message.

Workaround

None.

Fix Information

ClientHello SSLv2 issue is now fixed.

Behavior Change

During the SSL Handshake, the BIG-IP system strictly checks the protocol version in the pre-master secret to verify it matches with the protocol version used in the Client Hello.