Bug ID 531934: Support SSL serverside certificate validation using OCSP and CRLDP (CRL distribution point)

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 13.1.3.6, 13.1.4, 13.1.4.1, 13.1.5, 13.1.5.1

Fixed In:
14.0.0

Opened: Jul 06, 2015

Severity: 2-Critical

Symptoms

The system does only basic checks for the SSL certificate sent from SSL servers without going through valid protocols (for example, OCSP, CRL, SCVP). It at most allows a user to configure a pre-downloaded static CRL file for certificate authentication. However, in SSL forward proxy mode the SSL servers and hence their certificates dynamically change, so certificate authentication against a static CRL file is not an optimal configuration.

Impact

If the SSL server (or HTTP server) is using a revoked certificate, there is no way that the system can know which is a vulnerability.

Conditions

When the system needs to do SSL handshake with SSL servers.

Workaround

There is no workaround.

Fix Information

The system can now verify the status of the certificate from the SSL servers, by sending outbound queries to OCSP or CRLDP.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips