Bug ID 738032: BIG-IP system reuses cached session-id after SSL properties of the monitor has been changed.

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
12.1.3,,,,,,,, 12.1.4,, 12.1.5,,,, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0,,,,,,,,, 13.1.1,,,,, 13.1.3,,,,,, 14.0.0,,,,,, 14.0.1,,,,, 14.1.2,,,,,,,,, 14.1.3,, 15.0.0, 15.0.1,,,,, 15.1.0,,,,,, 15.1.1, 15.1.2

Fixed In:
16.1.0,,, 14.1.4,

Opened: Jul 24, 2018

Severity: 3-Major


The BIG-IP system maintains an SSL session cache for SSL (https) monitors. After changing the properties of an SSL monitor that might affect the operation of SSL, the BIG-IP continues to reuse an existing SSL session ID.


Sessions still use cached session ID. If session continues to succeed, session uses cached session ID till expiry.


-- The BIG-IP system has cached session ID from previous SSL session. -- SSL properties of monitor that might affect the operation of SSL are changed. -- Monitor is using bigd.


-- Restart bigd. -- Remove the monitor from the object and re-apply. -- Use in-tmm monitors.

Fix Information


Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips