Manual Chapter :
Create a custom Server SSL profile that supports CRL
Applies To:
Show Versions
BIG-IP AAM
- 14.1.3, 14.1.2, 14.1.0
BIG-IP APM
- 14.1.3, 14.1.2, 14.1.0
BIG-IP Analytics
- 14.1.3, 14.1.2, 14.1.0
BIG-IP LTM
- 14.1.3, 14.1.2, 14.1.0
BIG-IP PEM
- 14.1.3, 14.1.2, 14.1.0
BIG-IP AFM
- 14.1.3, 14.1.2, 14.1.0
BIG-IP DNS
- 14.1.3, 14.1.2, 14.1.0
BIG-IP ASM
- 14.1.3, 14.1.2, 14.1.0
Create a custom Server SSL profile that supports CRL
With a Server SSL profile,
the BIG-IP® system can perform decryption and
encryption for server-side SSL traffic.
A certificate revocation
list (CRL) is a published list of revoked certificates issued and updated by the
certificate authority who signed them. Clients like your internet browser, will
check the certificate's CRL URI to find out if the certificate is valid. When a
certificate is revoked, the CRL is updated to reflect the revokation and published
accordingly. Lists are not the most efficient way to maintain a record of revocation
in high volume scenarios so some application vendors have deprecated their use in
favor of online certificate status protcol (OCSP). However, you still need a CRL
configuraiton as it is still a common scenario and recommended for backward
compatibility.
Before you create a customer Server SSL profile that supports CRL, you
must create either a configured DNS resolver or a configured BIG-IP LTM
pool.
- Create an internal proxy
- On the Main tab, click.The Internal Proxies screen opens.
- ClickCreate.The New Internal Proxy screen opens.
- In theNamefield, type a unique name for your internal proxy.
- Select theUse Proxy Servercheck box if you want to use theProxy Server Poolinstead ofDNS Resolver. TheProxy Server Poolis the LTM pool with one or multiple proxies for forwarding the CRL request to the CRL server. TheDNS Resolveris the internal DNS resolver the BIG-IP system uses to fetch the internal proxy response.
- From theDNS Resolverlist, select the internal DNS resolver the BIG-IP system uses to fetch the internal proxy response. This involves specifying one or more DNS servers in the DNS resolver configuration. Use this option when:
- There is a DNS server that can do the name-resolution of the internal proxy.
- The internal proxy can be reached on one of BIG-IP system's interfaces.
If you are not selecting a pre-existing DNS Resolver you can create one. Click+to define a new internal DNS resolver and then return to this screen. - From theProxy Server Poollist, select the LTM pool for forwarding the CRL request to the CRL server.
- From theRoute Domainlist, select the route domain for fetching an internal proxy using HTTP explicit proxy. It is common to have the Route Domain set to0. Click+to define a new route domain.You have now created an internal proxy and are ready to create a CRL configuration object.
- Create a CRL configuration object
- On the Main tab, click.The CRL screen opens.
- ClickCreate.The New CRL screen opens.
- In theNamefield, type a name that specifies the certificate revocation list.
- Specify if you want to selectStrict Revocation Checkto protect your configuration from accidental future changes. The Strict Revocation Check specifies whether the strict revocation check for the certificate revocation list is enable or disabled. If the check box is selected it enables the strict revocation check and keymgmtd waits for the c fetching/caching to complete. If it is disabled, keymgmtd immediately replies with certificate status that is unknown and starts to download/cache the certificate revocation list file.
- For theInternal Proxysection, selectInternal Proxy Listto define the CRL list that specifies the internal DNS resolver or a proxy server pool. Select either New Internal Proxy or Internal Proxy List to specify the internal proxy.
- ClickUpdate.You are now ready to create your custom Server SSL profile that supports CRL.
- Create a Custom Server SSL Profile that supports CRL
- On the Main tab, click.The Server SSL profile list screen opens.
- ClickCreate.The New Server SSL Profile screen opens.
- In theNamefield, type a unique name for the profile.
- From theParent Profilelist, selectserverssl.
- From theConfigurationlist, selectAdvanced.
- Select theCustomcheck box.The settings become available for change.
- From theCertificatelist, select the name of an SSL certificate on the BIG-IP system.If the BIG-IP system is part of a DSC Sync-Failover group, always select a non-default certificate name, and ensure that this same certificate name is specified in every instance of this SSL profile in the device group. Taking these actions helps to ensure that SSL handshakes are successful after a failover event.
- From theKeylist, select the name of an SSL key on the BIG-IP system.If the BIG-IP system is part of a DSC Sync-Failover group, always select a non-default key name, and ensure that this same key name is specified in every instance of this SSL profile in the device group. Taking these actions helps to ensure that SSL handshakes are successful after a failover event.
- In thePass Phrasefield, type a pass phrase that enables access to the certificate/key pair on the BIG-IP system.
- From theChainlist, select the name of an SSL chain on the BIG-IP system.
- For theCipherssetting, specify a cipher group or cipher string by choosing one of these options.If you specified an ECDSA certificate key chain in theCertificate Key Chainsetting, you must include the cipher stringECDHE_ECDSAin the cipher group or cipher string that you specify in theCipherssetting. (At a minimum, you should specify a cipher group or string such asDEFAULT:ECDHE_ECDSA.) This is necessary to ensure successful cipher negotiation when the BIG-IP system is offered an ECDSA-based certificate only.OptionDescriptionCipher GroupSelect an existing cipher group from the list when you want to use a system-defined or custom cipher group to define the ciphers that the BIG-IP system uses for negotiating SSL connections. Here's an example of theCipherssetting where we've selected a custom cipher group that we created earlier.Cipher StringType a cipher string in the box if you want to manually specify a cipher string instead of selecting a cipher group. For security and performance reasons, consider following these recommendations:
- Always append ciphers to theDEFAULTcipher string.
- Type a cipher string that includes the ECC key type, because its shorter length speeds up encryption and decryption while still offering virtually the same level of security.
- Disable ADH ciphers but also include the keywordHIGH. To do this, just include both!ADHand:HIGHin your cipher string.
- For AES, DES, and RC4 encryption types, make sure you specify the DHE key exchange method. DHE usesForward Privacy, which creates a key that it throws away after each session so that the same session key never gets used twice. When you use DHE, make sure that the SSL private key isn't being shared with a monitoring system or a security device like an intrusion detection or prevention system. Also, diagnostic tools likessldumpwon't work when you're using Forward Secrecy.
- Disable EXPORT ciphers by including!EXPORTin the cipher string.
- If you can live with removing support for the SSLv3 protocol version, do it. This protocol version is not secure. Simply include:!SSLv3in any cipher string you type.
Here's an example of theCipherssetting where we have opted to manually type the cipher stringDEFAULT:ECDHE-RSA-AES-128-GCM-SHA256:!ADH:!EXPORT:HIGH: - In the same area of the screen, configure any other settings as needed.
- Select theCustomcheck box for the Server Authentication area of the screen.The settings become available for change.
- Change or retain the values for all Server Authentication settings as needed.
- From theCRLlist, select the CRL object that specifies the SSL client certificate constrained delegation CRL object that the BIG-IP system's SSL should use. You can click the+icon to open the create-new CRL object screen.
- From theCRL Filelist, select the name of a file containing a list of revoked server certificates.
- In theAllow Expired CRL Filefield, select the check box to instruct the system to use the specified CRL file even if it has expired. The default is disabled.
- Complete any other settings and clickFinished.
After performing this
task, you can see the custom Server SSL profile that supports CRL in the list of Server
SSL profiles on the system.