Applies To:
Show Versions
BIG-IP APM
- 17.5.1
BIG-IP Analytics
- 17.5.1
BIG-IP Link Controller
- 17.5.1
BIG-IP LTM
- 17.5.1
BIG-IP AFM
- 17.5.1
BIG-IP PEM
- 17.5.1
BIG-IP DNS
- 17.5.1
BIG-IP FPS
- 17.5.1
BIG-IP ASM
- 17.5.1
BIG-IP Release Information
Version: 17.5.1
Build: 7.0
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.
The blue background highlights fixes |
Known Issues in BIG-IP v17.5.x
Vulnerability Fixes
ID Number | CVE | Links to More Info | Description | Fixed Versions |
1881373-2 | CVE-2024-3661 | K000139553 | CVE-2024-3661 Tunnelvision Vulnerability | 17.5.1 |
1582781-6 | CVE-2021-23177 | K000140961 | CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target | 17.5.1 |
1353609-8 | CVE-2023-45886 | K000137315 | ZebOS BGP vulnerability CVE-2023-45886 | 17.5.1 |
987813-14 | CVE-2020-25643 | K65234135 | CVE-2020-25643 kernel:improper input validation in the ppp_cp_parse_cr function | 17.5.1 |
975605-11 | CVE-2018-1122 | K00409335 | CVE-2018-1122 procps-ng, procps: Local privilege escalation in top | 17.5.1 |
785209-6 | CVE-2019-9074 | K09092524 | CVE-2019-9074 binutils: out-of-bound read in function bfd_getl32 | 17.5.1 |
760895-13 | CVE-2009-5155 | K64119434 | CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result | 17.5.1 |
1672313-5 | CVE-2016-9841 | K000149915 | CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c | 17.5.1 |
1672249-5 | CVE-2016-9840 | K000149905 | CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c | 17.5.1 |
1589661-5 | CVE-2019-3860 | K000149288 | CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets | 17.5.1 |
1585277-4 | CVE-2024-28757 | K000139637, BT1585277 | Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757 | 17.5.1, 17.1.2.2 |
1576897-4 | CVE-2016-9063 | K000139691 | CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat | 17.5.1 |
1576125-4 | CVE-2024-27983 | K000139532, BT1576125 | Node.js vulnerability CVE-2024-27983 | 17.5.1, 17.1.2.2 |
1572145-5 | CVE-2023-29469 | K000139592 | CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic | 17.5.1 |
1517561-5 | CVE-2023-28484 | K000139641 | CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType | 17.5.1 |
1494229-5 | CVE-2023-2953 | K000138814 | CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function | 17.5.1 |
1441577-6 | CVE-2023-42795 | K000138178 | CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak | 17.5.1 |
1393733-8 | CVE-2022-43750 | K000139700 | CVE-2022-43750 kernel: memory corruption in usbmon driver | 17.5.1 |
1327169-7 | CVE-2023-24329 | K000135921 | CVE-2023-24329 python: urllib.parse url blocklisting bypass | 17.5.1 |
1306309-4 | CVE-2023-28709 | K000135262 | CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete | 17.5.1 |
1301545-7 | CVE-2023-0568 | K000134747 | CVE-2023-0568 php: 1-byte array overrun in common path resolve code | 17.5.1 |
1270257-8 | CVE-2023-0662 | K000133753 | CVE-2023-0662 php: DoS vulnerability when parsing multipart request body | 17.5.1 |
1093685-8 | CVE-2021-4083 | K52379673 | CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it | 17.5.1 |
1041141-3 | CVE-2021-35942 | K98121587 | CVE-2021-35942 glibc: Arbitrary read in wordexp() | 17.5.1 |
1028701-12 | CVE-2019-9947 | K000151516 | CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen() | 17.5.1 |
1001369-9 | CVE-2020-12049 | K16729408, BT1001369 | D-Bus vulnerability CVE-2020-12049 | 17.5.1, 15.1.4.1 |
988589-11 | CVE-2019-25013 | K68251873, BT988589 | CVE-2019-25013 glibc vulnerability: buffer over-read in iconv | 17.5.1, 15.1.4.1 |
921525-7 | CVE-2020-1752 | K49921213 | CVE-2020-1752: glibc vulnerability using glob | 17.5.1 |
1692917-5 | CVE-2024-6232 | K000148252 | CVE-2024-6232 CPython Tarfile vulnerability | 17.5.1 |
1623197-5 | CVE-2024-37891 | K000140711 | CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects | 17.5.1 |
1591249-5 | CVE-2018-6913 | K000141301 | CVE-2018-6913 perl: heap buffer overflow in pp_pack.c | 17.5.1 |
1566533-7 | CVE-2017-18342 | K000139901 | CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code | 17.5.1 |
1336185-6 | CVE-2018-12123 | K000137090 | NodeJS Vulnerability - CVE-2018-12122 | 17.5.1 |
1330801-8 | CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 | K000137090 | NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122 | 17.5.1 |
1304081-7 | CVE-2023-2650 | K000135178 | CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers | 17.5.1 |
1673161-4 | CVE-2023-45853 | K000149884 | CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 | 17.5.1 |
Functional Change Fixes
None
TMOS Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
949509-11 | 2-Critical | Eviction Policy UI Hardening | 17.5.1 | |
740258-2 | 2-Critical | Support IPv6 connections to TACACS+ remote auth servers | 17.5.1 | |
1934401-1 | 2-Critical | BT1934401 | iSeries HSB v5.26.8.0 firmware | 17.5.1 |
1934393-1 | 2-Critical | BT1934393 | iSeries HSB v5.9.14.0 firmware | 17.5.1 |
1934385-1 | 2-Critical | BT1934385 | iSeries HSB v4.3.5.0 firmware | 17.5.1 |
1926989-1 | 2-Critical | BT1926989 | BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core★ | 17.5.1 |
1492337-4 | 2-Critical | BT1492337 | TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU | 17.5.1 |
1382313-5 | 2-Critical | TMM might crash under certain conditions | 17.5.1 | |
867253-7 | 3-Major | BT867253 | Systemd not deleting user journals | 17.5.1 |
1934493-2 | 3-Major | BIG-IP SFTP hardening | 17.5.1 | |
1922525-1 | 3-Major | BIG-IP SCP hardening | 17.5.1 | |
1922501-1 | 3-Major | BT1922501 | TMM crash loop due to missing kernel driver | 17.5.1 |
1920341-1 | 3-Major | BT1920341 | SSH Public Key authentication allows RSA and not ECDSA in ccmode | 17.5.1 |
1880365-1 | 3-Major | BT1880365 | Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces | 17.5.1 |
1798961-2 | 3-Major | BT1798961 | With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support | 17.5.1 |
1789477-4 | 3-Major | BT1789477 | Orphaned tmsh processes might eventually lead to an out-of-memory condition | 17.5.1 |
1772377-3 | 3-Major | libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c | 17.5.1 | |
1622789-3 | 3-Major | BT1622789 | Traffic levels for NAT64/46 traffic might be different after an upgrade | 17.5.1, 17.1.2 |
1621269-1 | 3-Major | BT1621269 | TMM restart loop when attaching large number of interfaces. | 17.5.1 |
1550785-4 | 3-Major | HSB lock up in Syn-Ack generator module | 17.5.1 | |
1121517-5 | 3-Major | BT1121517 | Interrupts on Hyper-V are pinned on CPU 0 | 17.5.1, 16.1.4, 15.1.10 |
1047789-1 | 3-Major | BT1047789 | [APM] MCP err msg seen when editing/applying resource assign in VPE | 17.5.1 |
857045-6 | 4-Minor | BT857045 | LDAP system authentication may stop working | 17.5.1, 16.1.5 |
1787153-2 | 4-Minor | CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen() | 17.5.1 | |
1753933-4 | 4-Minor | CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name | 17.5.1 | |
1623597-3 | 4-Minor | BT1623597 | Nat46/64 hardware connection re-offload is not optimal. | 17.5.1 |
1401961-4 | 4-Minor | BT1401961 | A blade with a non-functional backplane may override the dag context for the whole system | 17.5.1 |
1144421-3 | 4-Minor | CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation | 17.5.1 | |
1069949-8 | 4-Minor | CVE-2018-1000007 curl: HTTP authentication leak in redirects | 17.5.1 | |
1057141-7 | 4-Minor | CVE-2018-14647 python: Missing salt initialization in _elementtree.c module | 17.5.1 | |
1052249-8 | 4-Minor | CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function | 17.5.1 | |
1052217-8 | 4-Minor | CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c | 17.5.1 | |
1580357-2 | 5-Cosmetic | CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write | 17.5.1 |
Local Traffic Manager Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1825513 | 1-Blocking | BT1825513 | ClientSSL profile with PQC group may cause TMM to crash | 17.5.1 |
1756525-2 | 2-Critical | BT1756525 | ixlv driver could have failed hardware offload with TSO off | 17.5.1 |
1579533-3 | 2-Critical | BT1579533 | Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons★ | 17.5.1 |
1267221-5 | 2-Critical | BT1267221 | When TMM starts, Hyper-V shows no RX packets on the ethX interface★ | 17.5.1 |
881065-8 | 3-Major | BT881065 | Adding port-list to Virtual Server changes the route domain to 0 | 17.5.1 |
1928537-1 | 3-Major | BT1928537 | Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs | 17.5.1 |
1825241-4 | 3-Major | BT1825241 | MCPD validation fails when non-existent cipher group is referenced by SSL profile | 17.5.1 |
1821033-2 | 3-Major | BT1821033 | Assertion "packet must already have an ethernet header" when using tcpdump | 17.5.1 |
1814821-3 | 3-Major | BT1814821 | DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously | 17.5.1 |
1636077-2 | 3-Major | BT1636077 | Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k | 17.5.1 |
1555525-4 | 3-Major | BT1555525 | WCCP traffic may have its source port changed | 17.5.1, 17.1.2 |
1550869-4 | 3-Major | BT1550869 | Tmm leak on request-logging or response logging on FTP virtual server | 17.5.1 |
1505649-3 | 3-Major | BT1505649 | SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length | 17.5.1, 17.1.2 |
1382181-2 | 3-Major | BT1382181 | BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled★ | 17.5.1 |
1309637-5 | 3-Major | BT1309637 | Mac masquerade not working after VLAN movement on host interfaces | 17.5.1 |
1282837-4 | 3-Major | DTLS1.2 Handshakes are causing tmm crash with mTLS connection | 17.5.1 | |
1620785-4 | 4-Minor | BT1620785 | F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers | 17.5.1 |
1352649-4 | 4-Minor | BT1352649 | The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted. | 17.5.1 |
Performance Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1814477-1 | 2-Critical | BT1814477 | AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0 | 17.5.1 |
Global Traffic Manager (DNS) Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1856289-2 | 3-Major | BT1856289 | Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon). | 17.5.1 |
1756397-3 | 3-Major | BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients | 17.5.1 |
Application Security Manager Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1857413-2 | 2-Critical | BT1857413 | Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile | 17.5.1 |
1758153-5 | 2-Critical | Configuring a Data Guard URL longer than 1024 characters triggers a restart loop | 17.5.1 | |
1920057-1 | 3-Major | Bd crashes | 17.5.1 | |
1789529-3 | 3-Major | BT1789529 | A crash of the bd daemon | 17.5.1 |
1629701-2 | 3-Major | BT1629701 | Attack signature is not shown in local event log for staged entity when not in learn/staging | 17.5.1 |
1621185-2 | 3-Major | BT1621185 | A BD crash on a specific scenario, even after ID1553989 | 17.5.1 |
1812201-4 | 4-Minor | BT1812201 | A specific unicode character issue a malformed json violation | 17.5.1 |
1782365-3 | 4-Minor | BT1782365 | Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format | 17.5.1 |
1709557-2 | 4-Minor | BT1709557 | Header value length greater than 1023 in alternate response file headers causing ASM restart loop | 17.5.1 |
1469393-2 | 4-Minor | BT1469393 | Browser extension can cause Bot-Defense profile screen to misfunction | 17.5.1 |
Access Policy Manager Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1930945 | 1-Blocking | BT1930945 | [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes★ | 17.5.1 |
930625-6 | 2-Critical | BT930625 | TMM crash is seen due to double free in SAML flow | 17.5.1 |
1825949-2 | 2-Critical | BT1825949 | [APM][Radius] Message-Authenticator value is incorrect for OTP request | 17.5.1 |
1821373-2 | 2-Critical | SAML Assertion Handling issue in APM SSO | 17.5.1 | |
1783081-3 | 2-Critical | BT1783081 | Removing conditional freeing for m_oauth instances in tmm | 17.5.1 |
1773161-2 | 2-Critical | BT1773161 | BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage | 17.5.1 |
1552705-6 | 2-Critical | BT1552705 | New subsession reads access_token from per-session policy instead of per-request policy. | 17.5.1 |
648946-4 | 3-Major | BT648946 | Oauth server is not registered in the map for HA addresses | 17.5.1 |
641662-1 | 3-Major | Always connected exclusion list does not support more than 10 entries. | 17.5.1 | |
634576-6 | 3-Major | K48181045, BT634576 | TMM core in per-request policy | 17.5.1, 16.1.5, 13.1.0 |
1926885 | 3-Major | BT1926885 | [APM] URL DB mismatch error for Religion categories in the upgrade★ | 17.5.1 |
1917741-2 | 3-Major | BT1917741 | [APM][TMM] memory growth in SAML SP while decoding assertion attributes | 17.5.1 |
1813841-1 | 3-Major | BT1813841 | Password Caching setting is not applied | 17.5.1 |
1813209-1 | 3-Major | BT1813209 | Password Cache Expiration field is hidden in Connectivity profile | 17.5.1 |
1796609-3 | 3-Major | BT1796609 | [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable★ | 17.5.1 |
1789501-3 | 3-Major | BT1789501 | [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode.★ | 17.5.1 |
1782113-3 | 3-Major | BT1782113 | Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message | 17.5.1 |
1771985-3 | 3-Major | [APM] OAuth AS max claims data support upto 8kb dynamically | 17.5.1 | |
1758181-2 | 3-Major | BT1758181 | Optimal gateway routing issue with HTML5 client | 17.5.1 |
1758029-2 | 3-Major | K000150565 | [APM][NA]VPN tunnels fail to establish when a virtual server is on a non-default route domain★ | 17.5.1 |
1672997-3 | 3-Major | BT1672997 | Apmd memory grows over time in AD/LDAP auth scenarios | 17.5.1 |
1628001-4 | 3-Major | BT1628001 | TMM core when ACL operation is performed on a deleted session | 17.5.1 |
1623941-4 | 3-Major | BT1623941 | [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade★ | 17.5.1 |
1583261-3 | 3-Major | BT1583261 | Saml traffic can rarely cause tmm cores | 17.5.1 |
1567761-3 | 3-Major | [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>' | 17.5.1 | |
1495381-3 | 3-Major | BT1495381 | TMM core with SWG explicit forward proxy configuration | 17.5.1 |
1400533-5 | 3-Major | BT1400533 | TMM core dump include SIGABRT multiple times, on the Standby device. | 17.5.1 |
1292605-4 | 3-Major | BT1292605 | Uncaught ReferenceError: ReferenceError: REquest is not defined | 17.5.1 |
1269709-5 | 3-Major | BT1269709 | GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles | 17.5.1, 17.1.2, 16.1.5 |
1144673-5 | 3-Major | Persistent Connection Issue in SSO v2 Plugin | 17.5.1 | |
1081245-3 | 3-Major | BT1081245 | [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one. | 17.5.1 |
1078713-1 | 3-Major | BT1078713 | Windows 11 not included in client OS check and Windows Info agent. | 17.5.1 |
926917-4 | 4-Minor | BT926917 | Portal Access: unwanted decoding html entities in attribute values of HTML tags | 17.5.1 |
811829-3 | 4-Minor | BT811829 | BIG-IP as Authorization server: OAuth Report GUI display expired token as active | 17.5.1 |
485387-2 | 4-Minor | EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP. | 17.5.1 | |
1825449-2 | 4-Minor | Citrix Optimal Gateway Routing is not showing login username of session | 17.5.1 | |
1818461-2 | 4-Minor | BT1818461 | [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching★ | 17.5.1 |
1737465-3 | 4-Minor | BT1737465 | Port number being used for verifying server certificate CN field | 17.5.1 |
1612885-3 | 4-Minor | BT1612885 | [PORTAL] Handle error in get_frameElement() | 17.5.1, 17.1.2 |
1591813-12 | 4-Minor | BT1591813 | [APM][SAML] SP automation fails with error message 'cannot update (cert_type)' | 17.5.1 |
Advanced Firewall Manager Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1132449-6 | 1-Blocking | BT1132449 | Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage | 17.5.1 |
997169-4 | 3-Major | BT997169 | AFM rule not triggered | 17.5.1, 17.1.2, 15.1.4.1 |
1936421-2 | 3-Major | BT1936421 | Core generated for autodosd daemon when synchronization process is terminated | 17.5.1 |
1934865-1 | 3-Major | BT1934865 | Remove multiple redundant entries for port-list objects in configuration file | 17.5.1 |
Traffic Classification Engine Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1826393-4 | 3-Major | TMM may restart when handling undisclosed traffic handled by IPS | 17.5.1 |
Device Management Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
985329-5 | 3-Major | BT985329 | Saving UCS takes longer and leaves temp files when iControl LX extension is installed | 17.5.1, 17.5.0, 17.1.2, 16.1.5 |
1626337-4 | 3-Major | K81310610, BT1626337 | RPMS not being included in the generated UCS with fix of ID985329 incorporated★ | 17.5.1 |
In-tmm monitors Fixes
ID Number | Severity | Links to More Info | Description | Fixed Versions |
1819777-4 | 2-Critical | BT1819777 | In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash | 17.5.1 |
Cumulative fix details for BIG-IP v17.5.1 that are included in this release
997169-4 : AFM rule not triggered
Links to More Info: BT997169
Component: Advanced Firewall Manager
Symptoms:
An AFM rule is not triggered when it should be.
Conditions:
-- Source and destination zone configured
-- A gateway pool is used in the route
Impact:
A firewall rule is not triggered and the default deny rule is used.
Workaround:
Alter the route to use an IP address and not a pool.
Fix:
Firewall rules are now triggered when gateway pools are used.
Fixed Versions:
17.5.1, 17.1.2, 15.1.4.1
987813-14 : CVE-2020-25643 kernel:improper input validation in the ppp_cp_parse_cr function
Links to More Info: K65234135
985329-5 : Saving UCS takes longer and leaves temp files when iControl LX extension is installed
Links to More Info: BT985329
Component: Device Management
Symptoms:
The tmsh command 'save sys ucs' takes longer when iControl LX extensions is installed, and it may leave /shared/tmp/rpm-tmp* files.
You may also see errors logged in /var/log/restjavad.0.log:
[WARNING][211][date and time UTC][8100/shared/iapp/build-package BuildRpmTaskCollectionWorker] Failed to execute the build command 'rpmbuild -bb --define '_tmppath /shared/tmp' --define 'main /var/config/rest/iapps/f5-service-discovery' --define '_topdir /var/config/rest/node/tmp' '/var/config/rest/node/tmp/ac891731-acb1-4832-b9f0-325e73ed1fd1.spec'', Threw:com.f5.rest.common.CommandExecuteException: Command execution process killed
at com.f5.rest.common.ShellExecutor.finishExecution(ShellExecutor.java:281)
at com.f5.rest.common.ShellExecutor.access$000(ShellExecutor.java:33)
at com.f5.rest.common.ShellExecutor$1.onProcessFailed(ShellExecutor.java:320)
at org.apache.commons.exec.DefaultExecutor$1.run(DefaultExecutor.java:203)
at java.lang.Thread.run(Thread.java:748)
Errors logged in /var/log/ltm:
err iAppsLX_save_pre: Failed to get task response within timeout for: /shared/iapp/build-package/a1724a94-fb6b-4b3e-af46-bc982567df8f
err iAppsLX_save_pre: Failed to get getRPM build response within timeout for f5-service-discovery
Conditions:
iControl LX extensions (e.g., AS3, Telemetry) are installed on the BIG-IP system.
Impact:
Saving the UCS file takes a longer time (e.g., ~1-to-2 minutes) than it does if iControl LX extensions are not installed (e.g., ~40 seconds).
/shared/tmp directory is filled with rpm-tmp* files.
Workaround:
The fix of another ID 929213 introduced a new database key iapplxrpm.timeout (default 60 seconds), which allows the RPM build timeout value to be increased.
sys db iapplxrpm.timeout {
default-value "60"
scf-config "true"
value "60"
value-range "integer min:30 max:600"
}
For example:
tmsh modify sys db iapplxrpm.timeout value 300
tmsh restart sys service restjavad
Increasing the db key and restarting restjavad should not be traffic impacting.
Fix:
Temp files under /shared/tmp is now cleaned up correctly.
Fixed Versions:
17.5.1, 17.5.0, 17.1.2, 16.1.5
975605-11 : CVE-2018-1122 procps-ng, procps: Local privilege escalation in top
Links to More Info: K00409335
949509-11 : Eviction Policy UI Hardening
Component: TMOS
Symptoms:
In certain scenarios, Eviction Policy UI does not follow best security practices.
Conditions:
Eviction Policy in Use
Impact:
N/A
Workaround:
None
Fix:
Best security practices are now applied in Eviction Policy UI
Fixed Versions:
17.5.1
930625-6 : TMM crash is seen due to double free in SAML flow
Links to More Info: BT930625
Component: Access Policy Manager
Symptoms:
When this issue occurs the TMM will crash
Conditions:
Exact reproduction steps are not known but it occurs during SAML transactions
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
N/A
Fixed Versions:
17.5.1
926917-4 : Portal Access: unwanted decoding html entities in attribute values of HTML tags
Links to More Info: BT926917
Component: Access Policy Manager
Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.
Conditions:
Portal Access is enabled
Impact:
Unwanted Application errors
Workaround:
None
Fix:
HTML entities in attribute values of HTML tags are no longer decoded by Portal Access
Fixed Versions:
17.5.1
921525-7 : CVE-2020-1752: glibc vulnerability using glob
Links to More Info: K49921213
881065-8 : Adding port-list to Virtual Server changes the route domain to 0
Links to More Info: BT881065
Component: Local Traffic Manager
Symptoms:
When attaching the port-list to virtual server dest:port-list, the route domain of the virtual server is changed to the default value of 0, and the port-list is not correctly applied. This is encountered in the GUI but not in the CLI.
Conditions:
Using port-list along with virtual server in non default route domain using the GUI.
Impact:
You are unable to use the GUI to attach a port-list that uses a non-default route domain to a virtual server.
Workaround:
Use tmsh to attach a port-list to a virtual server if the port-list uses a non-default route domain.
Fixed Versions:
17.5.1
867253-7 : Systemd not deleting user journals
Links to More Info: BT867253
Component: TMOS
Symptoms:
When setting 'SystemMaxUse' to any value, systemd does not honor this limit, and the specified size is exceeded.
Conditions:
Using a non-TMOS user account with external authentication permission.
Note: Systemd-journald is configured to create a user journal for every remote user that logs into the BIG-IP system.
Impact:
Journald filling up the file system. These journals are allocated with a minimum size of 4MiB and are not removed when the log entries age-out.
Workaround:
Option 1:
To immediately free up space, manually remove per-user journal logs from the following location:
/var/log/journal/*/user-*
Option 2:
To prevent the system from creating these journal files going forward:
1. Edit /etc/systemd/journald.conf and add the following at the bottom of the file:
SplitMode=none
2. Restart systemd-journal service
# systemctl restart systemd-journald
3. Delete the existing user journal files from /var/log
# rm /var/log/journal/*/user-*
Note:
-- You must apply this workaround separately to each blade of a VIPRION or vCMP guest running on a VIPRION.
-- You must reapply this workaround after performing software installations.
Fixed Versions:
17.5.1
857045-6 : LDAP system authentication may stop working
Links to More Info: BT857045
Component: TMOS
Symptoms:
If the system daemon responsible for LDAP authentication crashes, the system will not automatically restart it, and remote LDAP authentication may stop working.
In /var/log/daemon.log, you may see the following:
warning systemd[1]: nslcd.service failed
Conditions:
Nslcd daemon crashed, and it fails to restart.
Impact:
System authentication stops working until nslcd is restarted.
Workaround:
Manually restart nslcd daemon:
systemctl start nslcd
nslcd can be reconfigured to restart automatically and create core files when it crashes, though these changes will be lost across software installs (and is not backed up as part of a UCS archive):
1. Run "systemctl edit nslcd", which will open a text editor (by default, nano).
2. In the text editor, add these contents:
[Service]
# Allow core files
LimitCORE=infinity
# Try to keep auth daemon running, even if it crashes
Restart=always
3. Exit the text editor and save the file
4. Check the output of "systemctl status nslcd" for any warnings/errors from systemd as a result of editing the file; there should not be any.
5. Restart nslcd:
systemctl restart nslcd
Fixed Versions:
17.5.1, 16.1.5
811829-3 : BIG-IP as Authorization server: OAuth Report GUI display expired token as active
Links to More Info: BT811829
Component: Access Policy Manager
Symptoms:
Expired tokens status is shown as ACTIVE in the GUI whereas it is shown AS EXPIRED in the CLI via tmsh list apm oauth token-details
Conditions:
-- Access tokens/Refresh tokens should be expired
Impact:
Misleading information regarding the token status
Workaround:
Uuse 'tmsh list apm oauth token-details' but this shows only the first 100 tokens
Fix:
Made GUI changes to match the tmsh functionality
Fixed Versions:
17.5.1
785209-6 : CVE-2019-9074 binutils: out-of-bound read in function bfd_getl32
Links to More Info: K09092524
760895-13 : CVE-2009-5155 glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result
Links to More Info: K64119434
740258-2 : Support IPv6 connections to TACACS+ remote auth servers
Component: TMOS
Symptoms:
Pam_tacplus package 1.2.9 does not support IPv6 connections to TACACS+ remote auth server
Conditions:
IPv6 connections to TACACS+ remote auth server in system-auth methods
Impact:
On a pure IPv6 network, or a network where their TACACS server is only reachable via IPv6, will not be able to use TACACS for system-auth
Workaround:
None
Fix:
NA
Fixed Versions:
17.5.1
648946-4 : Oauth server is not registered in the map for HA addresses
Links to More Info: BT648946
Component: Access Policy Manager
Symptoms:
The same loopback address is assigned to two listeners.
Conditions:
-- AAA Servers with pool.
-- OAuth Server.
Impact:
Traffic issues due loopback address that is assigned to OAuth Server, can be assigned to some other AAA Server that also uses pool.
Workaround:
None
Fixed Versions:
17.5.1
641662-1 : Always connected exclusion list does not support more than 10 entries.
Component: Access Policy Manager
Symptoms:
In locked client mode, APM provides a way to configure destinations that can still be reached by client, even in locked client mode. Number of entries is limited to 10.
Conditions:
Locked client mode is enabled
Impact:
More than 10 exclusions cannot be added
Workaround:
None
Fixed Versions:
17.5.1
634576-6 : TMM core in per-request policy
Links to More Info: K48181045, BT634576
Component: Access Policy Manager
Symptoms:
TMM might core in cases when per-request policy encounters a reject ending and the server-side flow is not available.
Conditions:
APM or SWG per-request policy with reject ending.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
TMM no longer cores when per-request policy encounters reject ending.
Fixed Versions:
17.5.1, 16.1.5, 13.1.0
485387-2 : EncryptedAssertion may not be processed by BIG-IP as SP when EncryptedKey element is specified by RetrievalMethod Element by external IdP.
Component: Access Policy Manager
Symptoms:
An encrypted assertion from an external SAML Identity Provider (IdP) can contain the RetrievalMethod element to specify a link to the EncryptedKey element. The EncryptedKey element contains the key for decrypting the CipherData associated with an EncryptedData element.
BIG-IP configured as a Service Provider (SP) does not support the RetrievalMethod element while processing an encrypted assertion. As a result, the assertion is not processed properly, and error messages are printed to the log files: "Cannot decrypt SAML Assertion" and "failed to process encrypted assertion, error: Cipher value from EncryptedKey element not found".
Conditions:
External IdP uses RetrievalMethod to specify EncryptedKey element.
BIG-IP is configured as SP. BIG-IP requires received assertions to be encrypted.
Impact:
Authentication will fail due to inability to process assertion.
Workaround:
To work around the problem, reconfigure IdP to use embedded EncryptedKey instead of using RetrievalMethod.
Fixed Versions:
17.5.1
1936421-2 : Core generated for autodosd daemon when synchronization process is terminated
Links to More Info: BT1936421
Component: Advanced Firewall Manager
Symptoms:
Autodosd cores on SIGSEGV.
Conditions:
-- AFM DoS vectors configured
-- This can occur during normal operation but the specific conditions that trigger it are unknown
Impact:
Autodosd is restarted, but up to 15 seconds of history may be lost.
Workaround:
None
Fix:
Fixed an autodosd crash.
Fixed Versions:
17.5.1
1934865-1 : Remove multiple redundant entries for port-list objects in configuration file
Links to More Info: BT1934865
Component: Advanced Firewall Manager
Symptoms:
When a port-list object is created using one of the following TMSH CLIs (tmsh create net port-list, tmsh create security firewall port-list, or tmsh create security shared-objects port-list), redundant entries for the same object are generated in the configuration file under three contexts:
net port-list
security firewall port-list
security shared-objects port-list
For example, a port-list created using one CLI results in multiple entries referring to the same schema object, such as:
net port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security shared-objects port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security firewall port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
This behaviour causes unnecessary duplication in the configuration file.
Conditions:
Redundant entries occur in the configuration file when:
A port-list object is created using any one of the following TMSH CLIs:
1. tmsh create net port-list
2. tmsh create security firewall port-list
3. tmsh create security shared-objects port-list
All three CLI commands point to the same object and record three separate entries in the configuration file.
Impact:
Redundant entries in the configuration file lead to:
1. Increased configuration file size unnecessarily.
2. Risk of user confusion during manual editing or review of configuration files.
This issue does not impact runtime functionality or object behaviour, but it introduces maintenance overhead when users interact with their configurations.
Workaround:
None
Fixed Versions:
17.5.1
1934493-2 : BIG-IP SFTP hardening
Component: TMOS
Symptoms:
Under certain conditions SFTP does not follow current best practices.
Conditions:
- Authenticated high-privilege user
- SFTP file transfer
Impact:
BIG-IP does not follow best practices for sftp operations
Workaround:
N/A
Fix:
The SFTP file transfer now follows current best practices.
Fixed Versions:
17.5.1
1934401-1 : iSeries HSB v5.26.8.0 firmware
Links to More Info: BT1934401
Component: TMOS
Symptoms:
iSeries HSB v5.26.8.0 firmware
Conditions:
iSeries i11000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
17.5.1
1934393-1 : iSeries HSB v5.9.14.0 firmware
Links to More Info: BT1934393
Component: TMOS
Symptoms:
iSeries HSB v5.9.14.0 firmware
Conditions:
iSeries i5000, i7000, or i10000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
17.5.1
1934385-1 : iSeries HSB v4.3.5.0 firmware
Links to More Info: BT1934385
Component: TMOS
Symptoms:
iSeries HSB v4.3.5.0 firmware
Conditions:
iSeries i2000 or i4000 series appliance
Impact:
Not applicable.
Workaround:
Not applicable.
Fix:
Fixes HSB bit-flip issues. See ID891333 for more information.
Fixed Versions:
17.5.1
1930945 : [APM][KERBEROS][NTLM FALLBACK] Kerberos Authentication fails post-upgrade to v17.5.0/v17.5.1 — “Profile '/Common/kerberos_auth_config_default' was not found” and ECA Crashes★
Links to More Info: BT1930945
Component: Access Policy Manager
Symptoms:
1.ECA process continuously restarts (SIGSEGV/crash).
2. /var/log/apm contains errors indicating missing Kerberos config and NTLM fallback.
Conditions:
1. kerberos usecase
Impact:
1. Kerberos authentication fails, leading to unsuccessful proxy access for domain-joined users.
Workaround:
None
Fixed Versions:
17.5.1
1928537-1 : Missing initial PKCS11d login state causes login failures on certain AWS CloudHSMs
Links to More Info: BT1928537
Component: Local Traffic Manager
Symptoms:
The PKCS11d daemon did not properly initialize the login state for each partition. It was previously assumed that a user was effectively “logged in” on startup, even though no explicit state indicated CKR_USER_NOT_LOGGED_IN.
This worked with older HSMs and earlier AWS CloudHSM SDK3 primarily because those libraries did not strictly require an explicit CKR_USER_NOT_LOGGED_IN state; they would either auto-login or return CKR_USER_ALREADY_LOGGED_IN in most cases.
However, newer AWS CloudHSM libraries (SDK5) and other current HSM vendors require a proper indication that the user is not logged in to handle re-login flows correctly.
Conditions:
Use SDK version 5 with BIG-IP.
Impact:
Key creation fails.
Workaround:
None
Fix:
- This fix is applied to all HSMs, not just AWS CloudHSM. Each partition starts in a well-defined, “not logged in” state. It only transitions to CKR_OK or CKR_USER_ALREADY_LOGGED_IN when the device confirms the user is authenticated.
- The change sets the hsm_partitions.array[slot].login_status = CKR_USER_NOT_LOGGED_IN during session/partition initialization.
Fixed Versions:
17.5.1
1926989-1 : BIG-IP Virtual Edition: kswapd running constantly and consuming most of the CPU cycles of a core★
Links to More Info: BT1926989
Component: TMOS
Symptoms:
After a new installation or after an upgrade to of a Virtual Edition to one of the affected versions, the 'kswapd' daemon runs constantly, consuming up to 100% of the cycles of a CPU core.
Conditions:
- installation of a new BIG-IP Virtual Edition
or
- upgrade of a BIG-IP Virtual Edition to one of the affected versions
Impact:
A CPU core constantly consuming most of its CPU cycles.
General slowness of the system.
Workaround:
If the problem is present after a TMOS upgrade:
- check what was the value of vm.min_free_kbytes before the upgrade by booting back in the previous volume
- set the same value in the new volume with the command:
# sysctl -w vm.min_free_kbytes=<VALUE>
No reboot or tmm restart is needed.
If the Virtual Edition is a fresh install:
- set the vm.min_free_kbytes value to 24141
# sysctl -w vm.min_free_kbytes=24141
No reboot or tmm restart is needed.
You may need to follow the "Additional Information" section in https://my.f5.com/manage/s/article/K000150960 to ensure that the changes persist after a reboot.
Fix:
Vm.min_free_kbytes is given the correct value.
Fixed Versions:
17.5.1
1926885 : [APM] URL DB mismatch error for Religion categories in the upgrade★
Links to More Info: BT1926885
Component: Access Policy Manager
Symptoms:
Error messages in /var/log/apm
"The requested URL Category (/Common/Lesser-Known_Religions) was not found."
"The requested URL Category (/Common/Widely-Known_Religions) was not found."
Conditions:
APM provisions and SWG database downloads enabled.
Impact:
Upgrades fails with below error:
There were warnings:
Category name changed from /Common/Lesser_Known_Religions to in allowed categories of url filter /Common/test_filter
Category name changed from /Common/Widely_Known_Religions to in allowed categories of url filter /Common/test_filter
Compliance '/Common/gtp_unknown_tunnel_id' is deprecated and removed from '/Common/protocol_inspection'.
Compliance '/Common/smtp_command_length_overflow' is deprecated and removed from '/Common/protocol_inspection'.
01070734:3: Configuration error: In url-filter (/Common/<filter>), allowed-category () does not exist. In url-filter (/Common/<filter>), allowed-category () does not exist.
Unexpected Error: Loading configuration process failed.
Workaround:
Edit the respective categories before upgrading to the latest version.
1. Edit bigip.conf
2. Look for the respective failure filter name and change the
Lesser_Known_Religions to Lesser-Known_Religions and
Widely_Known_Religions to Widely-Known_Religions
3. Save the file
4. Update the configuration using tmsh save/load sys config
Fix:
Corrected category names in the configuration to address upgrade failures from older versions to 17.5.x caused by mismatches. The handling is implemented in the fixup script, which is triggered when a URL Filter is configured.
Fixed Versions:
17.5.1
1922525-1 : BIG-IP SCP hardening
Component: TMOS
Symptoms:
Under certain conditions SCP does not follow current best practices.
Conditions:
- Authenticated high-privilege user
- SCP file transfer
Impact:
BIG-IP does not follow best practices for scp operations
Workaround:
N/A
Fix:
The SCP file transfer in BIG-IP now follows current best practices.
Fixed Versions:
17.5.1
1922501-1 : TMM crash loop due to missing kernel driver
Links to More Info: BT1922501
Component: TMOS
Symptoms:
TMM goes into a crash loop with following logs in 'tmm' logs
notice EAL: Driver cannot attach the device (<VMBus-ID>)
notice EAL: Failed to attach device on primary process
notice dpdk[<VMBus-ID>]: Error: rte_dev_probe failed: err=-95
notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
notice xnet[00:e2.0]: Error: Unable to attach to xnet dev
This is due to missing uio_hv_generic kernel module which gets removed on TMM shutdown but fails to be re-inserted upon TMM post-crash restart.
Conditions:
1) BIG-IP on HyperV or Azure
2) Using xnet-DPDK driver
3) TMM crashes due to any other reason and restarts; can not repro directly using 'bigstart restart tmm' unless a 'bigstart restart' also reproduces the initial crash as well
Impact:
Traffic disrupted while tmm restarts.
Workaround:
(A)
1) Add 'modprobe uio_hv_generic' to '/usr/lib/bigstart/functions'
This will likely require remounting /usr to allow writing; this can be done via
sudo mount -o remount,rw /usr
2) Within 'functions', search for 'vadc_restore_vmbus_nics()' and add 'modprobe uio_hv_generic' to bottom of function after 'done'
3) Afterwards, restart TMM with 'bigstart restart tmm'
(B)
1) Switch to 'sock' driver by adding following config
[root@BIGIP:Active:Standalone] config # cat /config/tmm_init.tcl
device driver vendor_dev f5f5:f550 sock
[root@BIGIP:Active:Standalone] config #
2) Restart TMM with 'bigstart restart tmm'
Fix:
Re-activate missing module after TMM crash
Fixed Versions:
17.5.1
1920341-1 : SSH Public Key authentication allows RSA and not ECDSA in ccmode
Links to More Info: BT1920341
Component: TMOS
Symptoms:
When a device is in common criteria mode, you cannot use ecdsa-sha2-nistp256 or ecdsa-sha2-nistp384 for SSH public key authentication. Additionally, you can use rsa key which you should not be able to according to common criteria guidelines.
Conditions:
-- Common Criteria mode is enabled
Impact:
You cannot ssh with ECDSA but can with RSA key
Workaround:
Workaround is in file /config/ssh/sshd_config, on line 34 replace:
HostKey /config/ssh/ssh_host_rsa_key
with:
HostKey /config/ssh/ssh_host_ecdsa_key
HostKey /config/ssh/ssh_host_ecdsa_p384_key
Note that this workaround must be applied after each reboot in ccmode, since the sshd_config file will revert after reboot.
Fix:
SSH public key authentication works as expected in ccmode.
Fixed Versions:
17.5.1
1920057-1 : Bd crashes
Component: Application Security Manager
Symptoms:
Bd crashes
Conditions:
Running TMOS version of 17.5.0.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
Fix:
The crash no longer occurs.
Fixed Versions:
17.5.1
1917741-2 : [APM][TMM] memory growth in SAML SP while decoding assertion attributes
Links to More Info: BT1917741
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML traffic
Conditions:
-- SAML SP configured with assertion attributes.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
17.5.1
1881373-2 : CVE-2024-3661 Tunnelvision Vulnerability
Links to More Info: K000139553
1880365-1 : Cannot log into Fs_v2 Azure BIG-IP with >= 32 vCPUs and >= 5 interfaces
Links to More Info: BT1880365
Component: TMOS
Symptoms:
No login prompt is available to access Azure Fs_v2 instances when attaching 5 or more instances. 8 is the max number of interfaces for F32_v2 or larger.
Conditions:
-- Use Azure F32_v2 instance size or larger.
-- Attach 5 or more interfaces to BIG-IP.
Impact:
No access to F32_v2 instances or larger when attaching 5 or more interfaces.
Workaround:
None
Fix:
Login prompt is available.
Fixed Versions:
17.5.1
1857413-2 : Malformed XML data or Malformed JSON data violation raised despite URL containing content-profile
Links to More Info: BT1857413
Component: Application Security Manager
Symptoms:
* XML/JSON traffic gets flagged or blocked with a Malformed XML data or Malformed JSON data violation despite the URL having a content-profile associated with it.
* When the violation gets raised, the violation details lists the profile as "N/A".
* The XML/JSON content profiles are visible when viewing the content profile configuration via WebUI. However, corresponding database tables lose integrity, which results false positive.
Conditions:
Any change followed by 'Apply Policy' on a policy can ruin the integrity of corresponding database that might affect other policies, and false positive would start after subsequent 'Apply Policy' or global configuration update.
Impact:
XML/JSON traffic gets flagged or, if enforced, blocked despite the content profile associated to the URL.
Workaround:
Make a spurious policy change to the affected XML or JSON profile (e.g., updating its Description), followed by applying policy changes via 'Apply Policy,'
This helps resolve the issue by populating a new entry in the database table for this policy.
Avoid making any change on any GraphQL profile to prevent it from re-occurring.
Fix:
Configuration change will not ruin the integrity of the database tables.
Fixed Versions:
17.5.1
1856289-2 : Virtual server, which is managed by remote LTM device, is shown as "offline/enabled" with "Monitor /Common/bigip : no reply from big3d: timed out" message (red diamond icon).
Links to More Info: BT1856289
Component: Global Traffic Manager (DNS)
Symptoms:
When a virtual server object, which is managed by a remote LTM device, is disabled, after gtmd is restarted (or GTM/DNS device reboot) and gtmd becomes online and iQuery communication is re-established with the remote LTM device, the bellow message is logged to /var/log/gtm and virtual server status becomes "offline/disabled" (black diamond icon).
gtmd[xxxx]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.201:80 CHECKING --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
gtmd[xxxx]: 011a6006:1: SNMP_TRAP: virtual server /Common/vs1 (ip:port=10.1.1.201:80) (Server /Common/bigipltm) state change blue --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)
Then, even after re-enabling the virtual server, which is managed by LTM, virtual server stays as "offline/enabled" (red diamond icon) with "Monitor /Common/bigip : no reply from big3d: timed out" message.
----------------------------------
| Gtm::Virtual Server: vs1
----------------------------------
| Status
| Availability : offline
| State : enabled
| Reason : Monitor /Common/bigip : no reply from big3d: timed out
| Destination : 10.1.1.201:80
| Up Time : ---
Conditions:
All of the following conditions met.
- GTM/DNS device manages remote LTM device and its virtual server.
- Remote LTM virtual server is not directly monitored by GTM/DNS device monitor object. Instead, remote LTM virtual server is monitored by remote LTM device itself (e.g., on remote LTM device, virtual server pool is monitored by pool monitor).
- On GTM/DNS device, disable and re-enable virtual server, which is managed by remote LTM device.
- After virtual server is disabled on GTM/DNS device, gtmd restart on GTM/DNS device or GTM/DNS device reboots.
- GTM/DNS is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.
Impact:
Virtual server stays as unavailable despite the remote LTM device reporting virtual server status as 'up'. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.
Workaround:
If issue had already occurred and virtual server stayed as "offline/enabled" (red diamond icon), restarting gtmd on GTM/DNS device will rescue the affected virtual server.
If issue does not yet occur but virtual server is going to be disabled and re-enabled, you can prevent issue by changing "DNS >> Settings : GSLB : General - Monitor Disabled Objects" setting (gtm global-settings general monitor-disabled-objects) to "yes" (default "no"). This needs to be done prior to disabling virtual server (prior to gtmd restart/reboot).
# tmsh modify gtm global-settings general monitor-disabled-objects yes
# tmsh save sys config gtm-only
Fixed Versions:
17.5.1
1826393-4 : TMM may restart when handling undisclosed traffic handled by IPS
Component: Traffic Classification Engine
Symptoms:
tmm crashes and restarts due to memory pressure
Conditions:
IPS configured on virtual.
Impact:
TMM restarts - traffic interruption.
Workaround:
N/A
Fix:
The undisclosed traffic scenario no longer causes TMM to restart.
Fixed Versions:
17.5.1
1825949-2 : [APM][Radius] Message-Authenticator value is incorrect for OTP request
Links to More Info: BT1825949
Component: Access Policy Manager
Symptoms:
When a OTP challenge is requested on RSA, the Message-Authenticator value in the second request is not corrected/alarmed by the RSA server.
Eventually the packet is dropped at the Radius Server.
Conditions:
The Message-Authenticator attribute radius.messageauthenticator is set to true.
Impact:
This causes authentication failures, disrupting the user’s access control process.
Workaround:
None
Fixed Versions:
17.5.1
1825513 : ClientSSL profile with PQC group may cause TMM to crash
Links to More Info: BT1825513
Component: Local Traffic Manager
Symptoms:
TMM or system services may restart unexpectedly due to memory pressure.
Conditions:
Cipher rule DH group X25519KYBER768 is enabled.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
There is no workaround, disable X25519KYBER768 to mitigate the issue.
Fix:
Fix memory issues.
Fixed Versions:
17.5.1
1825449-2 : Citrix Optimal Gateway Routing is not showing login username of session
Component: Access Policy Manager
Symptoms:
When an iRule-based solution for optimal gateway routing is used for Citrix VDI, the currently logged-in username will not be displayed on the GUI session details page.
Conditions:
- APM Citrix VDI OGR is implemented with an iRule workaround.
- When the user checks the last logged-in username in the GUI.
Impact:
Username column displays empty instead of username.
Workaround:
None
Fix:
The Username column should display the name of the user currently logged in for the session.
Fixed Versions:
17.5.1
1825241-4 : MCPD validation fails when non-existent cipher group is referenced by SSL profile
Links to More Info: BT1825241
Component: Local Traffic Manager
Symptoms:
When using "tmsh load sys config verify" or performing an MCPD forceload/reboot, no validation error is reported for a SSL profile referencing a non-existent cipher group. This is unexpected behavior.
However, when using "tmsh load sys config", the system correctly identifies and reports the missing cipher group as a validation error. This is the expected behavior.
Conditions:
The disk config file (/config/bigip.conf) is missing the cipher group configuration, while that cipher group continues to be referenced within a SSL profile.
Impact:
When a SSL profile references a non-existent cipher group, the configuration loads without validation errors under certain conditions. This can result in connection failures with error messages such as:
Connection error: hud_ssl_handler:1315: alert(40) invalid profile unknown on VIP <VIP_NAME>
Workaround:
Ensure the disk config file (/config/bigip.conf) always has the cipher group present if it is being referenced by a Client or Server SSL profile.
Fixed Versions:
17.5.1
1821373-2 : SAML Assertion Handling issue in APM SSO
Component: Access Policy Manager
Symptoms:
When attributes with large encrypted values are present, the allocated memory may not be appropriately resized, leading to unexpected behavior.
Conditions:
This occurs specifically under configurations that utilize SAML with encrypted attributes containing large values.
Impact:
TMM core, partial traffic disruption
Workaround:
NA
Fix:
SAML Assertion Handling issue in APM SSO has been addressed.
Fixed Versions:
17.5.1
1821033-2 : Assertion "packet must already have an ethernet header" when using tcpdump
Links to More Info: BT1821033
Component: Local Traffic Manager
Symptoms:
Tmm crashes when running tcpdump.
Conditions:
1. A virtual server references another virtual server with an iRule
2. The destination virtual server has an iRule with reject inside FLOW_INIT
3. Use tcpdump while hitting the reject rule
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use either remote tcpdump or avoid using reject rule in FLOW_INIT.
Fix:
Tmm no longer crashes in this scenario.
Fixed Versions:
17.5.1
1819777-4 : In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash
Links to More Info: BT1819777
Component: In-tmm monitors
Symptoms:
In-tmm TCP monitor with no RCV and RCVdisable string might lead to a crash.
Conditions:
This happens when TCP in-tmm monitor is configured without any matching disable/enable string
ltm monitor tcp TCP {
adaptive disabled
defaults-from tcp
interval 5
ip-dscp 0
recv none <<<< !
recv-disable none <<<< !
send "GET /check HTTP/1.0\r\n\r\n"
time-until-up 0
timeout 16
}
Bigd monitoring is not affected.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
- Disable in-tmm monitoring.
- OR, configure in-tmm TCP monitor with any string match.
Fixed Versions:
17.5.1
1818461-2 : [APM][VPN][WIN] Tunnel can't be established if endpoint inspection is Skipped. Machine Hash is not maching★
Links to More Info: BT1818461
Component: Access Policy Manager
Symptoms:
Because of selecting Skip Inspection button during EPI launch, it leads to in-correct machine hash and VPN connection is failed with below errors.
err tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64086, [0x2ff9084:34740] Machine Hash is not Valid
tmm1[18549]: 01230140:3: RST sent from 10.103.xx.xx:443 to 10.103.xx.xx:64123, [0x2ff9084:4239] Access encountered an error (Operation not supported)
Conditions:
-- Endpoint inspection is enabled in access policy, add Advanced resources assignment for fallback branch and end with allow
-- Launch endpoint inspection, select Skip Inspection instead of Start Inspection
If you are upgrading, this can be encountered after upgrading to version 17.1.2 and APM client (7250 or 7251).
Impact:
TCP connection reset is encountered and VPN connection fails.
Workaround:
Instead of Skip Inspection, select Start Inspection
(Or)
Don't configure any EPI check in Access policy
Fixed Versions:
17.5.1
1814821-3 : DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously
Links to More Info: BT1814821
Component: Local Traffic Manager
Symptoms:
You might observe CRIT-level logs of configuration issues in the TMM logs but there is no impact to the traffic. Example log message:
crit tmm4[17746]: 01260000:2: Profile /Common/serverssl-secure: DHE groups present in profile's cipherlist with TLS1.3 enabled and tmm.ssl.useffdhe set to false simultaneously.
Conditions:
1. The db variable tmm.ssl.useffdhe set to false
2. Virtual server configured to use DH groups
Impact:
Crit-level logs are logged to /var/log/tmm
Workaround:
Leave the tmm.ssl.useffdhe value to default which is true
Fixed Versions:
17.5.1
1814477-1 : AWS Performance Drop from BIG-IP v17.1.2.1 to v17.5.0
Links to More Info: BT1814477
Component: Performance
Symptoms:
A FastL4 throughput drop occurs when updating to BIG-IP version 17.5.0.
Conditions:
-- Using AWS BIG-IP v17.5.0
Impact:
Throughput is lower compared to v17.1.2.1.
Workaround:
None
Fix:
Performance is improved in v17.5.0 compared to v17.1.2.1.
Fixed Versions:
17.5.1
1813841-1 : Password Caching setting is not applied
Links to More Info: BT1813841
Component: Access Policy Manager
Symptoms:
In the Connectivity profile, "F5 Access for Mac OS" is removed and updated on "Desktop Client Settings".
The Allow password caching functionality which was used to work with "F5 Access for Mac OS" is not working after updating the UI to "Desktop Client Settings".
Conditions:
Allow Password Caching is enabled on BIG-IP UI for Mac F5 Access.
Impact:
Users will be prompted to password page even after Allow Password caching is enabled.
Workaround:
Enable the Allow password caching via TMSH:
For Memory Option to Enable on Allow Password Caching:
modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method memory save-password-timeout 10 } } }
For Disk option to Enable on Allow Password Caching:
modify apm profile connectivity Connectivity_profile client-policy modify { Connectivity_profile_clientPolicy { macos-ec { save-password true save-password-method disk } } }
Fixed Versions:
17.5.1
1813209-1 : Password Cache Expiration field is hidden in Connectivity profile
Links to More Info: BT1813209
Component: Access Policy Manager
Symptoms:
Password Cache Expiration field is hidden in Connectivity profile under Desktop Client Settings
Conditions:
1. Access-> Connectivity/VPN -> Profiles ->add/edit
2. Desktop Client Settings -> enable "Allow Password Caching"
3. Select "memory" as the "Save Password Method"
Impact:
For Creating new Connectivity profile:
You will not be able to set Password Cache Expiration value and default value of 240 will be used
For Existing Connectivity Profile:
You will not be able to modify the Password Cache Expiration value (Existing value).
In case of upgrades the existing value will be used
Workaround:
To modify the Password Cache Expiration value run:
tmsh modify apm profile connectivity <profile_name> client-policy modify { <profile_name>_clientPolicy { ec { save-password-timeout <desired value> } } }
Fixed Versions:
17.5.1
1812201-4 : A specific unicode character issue a malformed json violation
Links to More Info: BT1812201
Component: Application Security Manager
Symptoms:
When JSON arrives with a specific character, a malformed json violation is issued.
Conditions:
A specific character arrives in a JSON payload
Impact:
A blocking violation occurs.
Workaround:
None
Fixed Versions:
17.5.1
1798961-2 : With CC/FIPS license installed, OpenSSL should raise fatal alert when client does not advertise EMS support
Links to More Info: BT1798961
Component: TMOS
Symptoms:
When FIPS license is installed, OpenSSL enforces Extended Master Secret (EMS) to its peer clients. If a legacy TLS/SSL client does not provide EMS in its ClientHello extension, OpenSSL server merely aborts the handshake without sending a Fatal Handshake Alert message to the client. As a result, the reason for handshake abort is not clear.
Conditions:
1. FIPS license is installed on the BIG-IP Device
2. HTTPD server running on the BIG-IP device is linked with libssl.{so, a}
3. An attempt is made to contact the WebUI from a legacy browser that did not have support for EMS (or alternatively, from a service that did not advertise EMS support)
Impact:
Absence of explicit log message results in some confusion as to what the error was when the handshake terminated.
Workaround:
None
Fix:
A log message indicating a Fatal Handshake Message alert will be added. Then, whenever a legacy TLS/SSL client failed to provide the Extended Master Secret in its ClientHello message to the BIG-IP device with FIPS license installed, an error will be logged as the handshake aborts. This will inform the user the reason for the handshake termination.
Fixed Versions:
17.5.1
1796609-3 : [APM][VDI]TCL error when upgrading to 17.x: can't read "tmm_apm_feed_login": no such variable★
Links to More Info: BT1796609
Component: Access Policy Manager
Symptoms:
After upgrading from BIG-IP version 15 to version 17 you may get a RST due to the below TCL error when requesting some application URLs:
TCL error: /Common/_sys_APM_VDI_Helper <HTTP_RESPONSE_RELEASE> - can't read "tmm_apm_feed_login": no such variable while executing "if { ($tmm_apm_client_type == "rdg-http" || $tmm_apm_feed_login) && $tmm_apm_is_nego_auth } { # Getting response header fo..."
Conditions:
-- VDI profile is attached
-- iRules are attached with custom priorities
Impact:
TCL errors observed in the LTM logs leading to connection reset
Workaround:
None
Fixed Versions:
17.5.1
1789529-3 : A crash of the bd daemon
Links to More Info: BT1789529
Component: Application Security Manager
Symptoms:
A crash happens on specific xml payloads
Conditions:
Very specific circumstances related to specific policy and traffic.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
Fix:
A crash related to the XML parser was fixed.
Fixed Versions:
17.5.1
1789501-3 : [APM][Standard Customisation]Webtop is blank after upgrading APM version 17.1.2 with Edge Browser in Compatibility mode.★
Links to More Info: BT1789501
Component: Access Policy Manager
Symptoms:
The Webtop is blank, does not display any resources.
Conditions:
The issue occurs when all of the following conditions are met.
-Using Microsoft Edge browser in compatibility mode (IE mode)
-Access Profile is using standard customisation
-BIG-IP Version 17.1.2 or later, 16.1.5 or later (version with fix of ID504374)
Impact:
Unable to use legacy applications in Microsoft Edge's IE compatibility mode
Workaround:
Use modern customization for access profile.
Fixed Versions:
17.5.1
1789477-4 : Orphaned tmsh processes might eventually lead to an out-of-memory condition
Links to More Info: BT1789477
Component: TMOS
Symptoms:
Occasionally, tmsh processes are orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects.
An orphaned tmsh process will have a parent pid (PPID) of 1. You can check for orphaned tmsh processes using the following shell command:
/bin/ps -o pid,ppid,comm -C tmsh
PID PPID COMMAND
8255 1 tmsh
If this issue occurs often enough, it might cause the BIG-IP system to run out of memory.
Conditions:
-- Using tmsh to connect to the BIG-IP system via SSH.
-- Running commands.
-- Quitting the session or disconnecting.
Impact:
Orphaned tmsh processes are created, which might eventually lead to an out-of-memory condition, if it occurs often enough.
Workaround:
There are several workarounds for this issue:
-- Change the default shell to bash for users that are going to use the script.
-- Use iControl.
-- Kill orphaned tmsh processes.
Fix:
Tmsh processes are no longer orphaned when a user connects to the BIG-IP system via SSH, runs commands, and then quits the session or disconnects under these conditions.
Fixed Versions:
17.5.1
1787153-2 : CVE-2019-9740 python: CRLF injection via the query part of the url passed to urlopen()
Component: TMOS
Symptoms:
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n followed by an HTTP header or a Redis command.
Conditions:
NA
Impact:
With arbitrary HTTP headers, there is a possibility of CRLF Injection.
Workaround:
NA
Fix:
Patched python to fix the vulnerability.
Fixed Versions:
17.5.1
1783081-3 : Removing conditional freeing for m_oauth instances in tmm
Links to More Info: BT1783081
Component: Access Policy Manager
Symptoms:
Increase in TMM memory with M_OAUTH instances
Conditions:
M_OAUTH instances are freed based on conditional checks.
Impact:
Memory leak in TMM.
Workaround:
None
Fix:
Remove conditional freeing.
Fixed Versions:
17.5.1
1782365-3 : Importing a policy creates default 'password' sensitive parameter when it is not present in the exported policy in full JSON format
Links to More Info: BT1782365
Component: Application Security Manager
Symptoms:
Importing a policy creates a default 'password' sensitive parameter when it is not present in the exported policy in full JSON mode
Conditions:
-- Create a policy with API security template.
-- Delete the default "password" sensitive parameter.
-- Export the policy in full JSON format.
-- Import the policy again.
Impact:
Unexpected sensitive parameter appears in imported policy
Workaround:
None
Fix:
The policy is imported without sensitive parameters that do not appear in the full JSON policy
Fixed Versions:
17.5.1
1782113-3 : Parameter 'redirectwebauthn:i:0' is crashing the RDP file with 'The RDP File is corrupted' error message
Links to More Info: BT1782113
Component: Access Policy Manager
Symptoms:
Currently, with the below Custom Parameters
redirectclipboard:i:0
redirectprinters:i:0
redirectsmartcards:i:0
redirectwebauthn:i:0
The issue is when adding 'redirectwebauthn:i:0' to RDP Custom Parameters, the user gets RDP connection error when the user opens the downloaded RDP file. The ‘The RDP File is corrupted. The remote connection cannot be started’ message is displayed.
Conditions:
The parameter 'redirectwebauthn:i:0' is added to RDP Custom Parameters.
Impact:
Displays the below error message while opening the RDP file:
‘The RDP File is corrupted. The remote connection cannot be started’
Workaround:
Launch the RDP without the "redirectwebauthn:i:0" parameter.
Fixed Versions:
17.5.1
1773161-2 : BIG-IP APM 17.1.2 VPN tunnels failed to establish at "GET /isession" stage
Links to More Info: BT1773161
Component: Access Policy Manager
Symptoms:
Windows Edgeclient (any other client) stuck at Initialisation.
You may observe a lot of below logs in f5tunnelserver.txt
2024-12-15,12:32:26:530, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:27:035, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:27:541, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
2024-12-15,12:32:28:046, 19084,19088,, 48, , 970, CUTunnelServerX::isReady(), server response , result=0
Conditions:
-- BIG-IP version with fix of ID 903501
-- "sys db ipv6.enabled" is set to FALSE
-- Any client attempting to establish a VPN tunnel
Impact:
VPN fails to establish
Workaround:
1. "sys db ipv6.enabled" is set to TRUE
OR
2. Perform below two operations
a) Disable the DB variable isession.ctrl.apm:
tmsh modify sys db isession.ctrl.apm value disable
b) Perform 'Apply Access Policy' for the access policy attached to the virtual server.
Fixed Versions:
17.5.1
1772377-3 : libtiff CVE-2024-7006: NULL pointer dereference in tif_dirinfo.c
Component: TMOS
Symptoms:
A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
Conditions:
Occurs when processing a crafted TIFF file with malformed directory metadata.
Impact:
This vulnerability leads to a NULL pointer dereference, causing a crash or denial of service.
Workaround:
NA
Fix:
Patched libtiff to fix the vulnerability
Fixed Versions:
17.5.1
1771985-3 : [APM] OAuth AS max claims data support upto 8kb dynamically
Component: Access Policy Manager
Symptoms:
The max claim data size is set to 8kb by default.
Conditions:
Oauth AS configured with multiple claims.
Impact:
The large claim size can lead to excessive memory consumption.
Workaround:
None
Fix:
Allocate the right amount of memory dynamically as required based on claims configuration
Fixed Versions:
17.5.1
1758181-2 : Optimal gateway routing issue with HTML5 client
Links to More Info: BT1758181
Component: Access Policy Manager
Symptoms:
When you configure APM VDI Citrix OGR using article https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727, the system fails to start ica connection to the backend desktop using HTML5 access.
Additionally, the iRule example is incorrect.
Conditions:
1. OGR is configured using https://community.f5.com/kb/technicalarticles/solution-for-citrix-optimal-gateway-routing/278727
2. Use HTML5 client access
Impact:
Could not connect to backend desktop using HTML5.
Workaround:
None
Fix:
It should connect to backend desktop using HTML5 along with native client.
Fixed Versions:
17.5.1
1758153-5 : Configuring a Data Guard URL longer than 1024 characters triggers a restart loop
Component: Application Security Manager
Symptoms:
Data Guard URLs are expected to be shorter than 1024 characters. If you configure a longer Data Guard URL, the configuration will cause the enforcer to crash and cause a restart loop.
Conditions:
A Data Guard URL longer than 1024 characters is configured and the policy is applied.
Impact:
The enforcer crashes and causes a restart loop.
Workaround:
Wildcards (*) should be utilized for any URL that is exceedingly long.
Fixed Versions:
17.5.1
1758029-2 : [APM][NA]VPN tunnels fail to establish when a virtual server is on a non-default route domain★
Links to More Info: K000150565
Component: Access Policy Manager
Symptoms:
Observe VPN fails with below error in /var/log/ltm
err tmm[20501]: 01470000:3: iSession: Connection error: isession_handle_syn:3737: No peer:4
Conditions:
-- VPN configured across multiple route domains
-- Route domains are not related
-- BIG-IP v17.1.x (this can be encountered while upgrading to v17.1.x)
Impact:
VPN fails to establish
Workaround:
Make sure the default route domain is a parent of the non-default route domain.
Fixed Versions:
17.5.1
1756525-2 : ixlv driver could have failed hardware offload with TSO off
Links to More Info: BT1756525
Component: Local Traffic Manager
Symptoms:
IPv4 packets for TLS alerts contain empty IP checksums.
Conditions:
-- The ixlv driver is used by tmm
-- TSO is disabled
Impact:
Empty checksums will cause TLS clients to reject TLS alert messages.
Workaround:
Change driver type to use xnet in tmm_init.tcl by inputting `device driver pci vendor_dev 8086:1889 xnet` or for a specific PCI device with `device driver pci XX:XX.X xnet`
Fix:
Removed offloading IPv4 header checksum to the hardware unless TSO is on and so use what BIG-IP calculates instead.
Fixed Versions:
17.5.1
1756397-3 : BIG-IP is not forwarding the Extended DNS Error (EDE) Codes to Clients
Component: Global Traffic Manager (DNS)
Symptoms:
When BIG-IP processes responses from upstream name servers, it strips the Extended DNS Error (EDE) information, which provides additional details about the cause of DNS errors.
Conditions:
-- BIG-IP is configured with a listener that has a DNS profile to process DNS queries.
-- DNS requests from clients include the EDNS (Extension Mechanisms for DNS) flag.
Impact:
DNS clients will not receive additional information about the cause of DNS errors.
Workaround:
None
Fix:
With the fix, BIG-IP is now able to process and respond to clients with Extended DNS Errors (EDE) information that it receives from upstream name servers.
We have exposed the fix through a Db variable called dns.forwardextendeddnserrorcode. By default, the Extended DNS Errors(EDE) support is disabled. If you want to enable EDE support you can change the Db variable value to enable.
sys db dns.forwardextendeddnserrorcode {
value "enable"
}
To avoid truncation due to lengthy extra text that is part of the EDE, we have limited it to 64 bytes.
Fixed Versions:
17.5.1
1753933-4 : CVE-2020-14393 perl-dbi: Buffer overflow on an overlong DBD class name
Component: TMOS
Symptoms:
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
Conditions:
Triggered when loading a DBD module with an excessively long class name.
Impact:
This vulnerability may cause a heap-based buffer overflow, potentially leading to a crash or arbitrary code execution.
Workaround:
NA
Fix:
Patched Perl-DBI to fix the vulnerability.
Fixed Versions:
17.5.1
1737465-3 : Port number being used for verifying server certificate CN field
Links to More Info: BT1737465
Component: Access Policy Manager
Symptoms:
TMM reports a SSL certificate error:
warning tmm1[18695]: 01260022:4: Peer cert verification: The common name (10.1.1.1) is invalid or does not match the authenticate name (10.1.1.1:4430). The subject alternative name also does not match the authenticate name.
Conditions:
-- The ssl server certificate is set to "require"
-- The URI includes the port number
Impact:
SSL server certificate validation fails
Workaround:
Set server certificate requirement to "ignore"
Fixed Versions:
17.5.1
1709557-2 : Header value length greater than 1023 in alternate response file headers causing ASM restart loop
Links to More Info: BT1709557
Component: Application Security Manager
Symptoms:
Bd goes into a restart loop with the following error messages:
ECARD_POLICY|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_ALTERNATE_RESPONSE_FILE_HEADERS res:[0]
BD_MISC|ERR |Oct 25 02:01:27.939|21735|temp_func.c:2295|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message
BD_MISC|ERR |Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|CONFIG_TYPE_PROTOBUF_FILENAMES message had errors in block_index: 22. status=-1
BD_MISC|NOTICE|Oct 25 02:01:27.939|21735|table_funcs.cpp:2734|{"component":"BD","datetime":"1969-12-31T16:00:00Z","jobId":"","jobStartDatetime":"1969-12-31T16:00:00Z","jobStatus":"failed"}
BD_MISC|ERR |Oct 25 02:01:27.940|21735|temp_func.c:2288|CONFIG_TYPE_MANIFEST message had parsing error: could not parse protobuf message
Conditions:
A header in the blocking page is configured to be more than 1023 bytes.
Impact:
Endless restart loop
Workaround:
Change the blocking page header size.
Fixed Versions:
17.5.1
1692917-5 : CVE-2024-6232 CPython Tarfile vulnerability
Links to More Info: K000148252
1673161-4 : CVE-2023-45853 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
Links to More Info: K000149884
1672997-3 : Apmd memory grows over time in AD/LDAP auth scenarios
Links to More Info: BT1672997
Component: Access Policy Manager
Symptoms:
Apmd memory grows over time. It is mainly due to memory fragmentation due to memory sharing among apmd threads.
Conditions:
The access policy in use has AD/LDAP auth as one of the agents
Impact:
Apmd memory grows over time. After it grows beyond a limit, oom killer might kill apmd thereby leading to traffic disruption.
Workaround:
None
Fixed Versions:
17.5.1
1672313-5 : CVE-2016-9841 zlib: Out-of-bounds pointer arithmetic in inffast.c
Links to More Info: K000149915
1672249-5 : CVE-2016-9840 zlib: Out-of-bounds pointer arithmetic in inftrees.c
Links to More Info: K000149905
1636077-2 : Adding an operationally DOWN interface to existing LAG causes traffic disruption on r2k/r4k
Links to More Info: BT1636077
Component: Local Traffic Manager
Symptoms:
When an operationally DOWN interface is added to an existing LAG interface, traffic flow to the tenant stops on r2k/r4k based appliances.
Conditions:
-- Interface is marked down
-- Interface is added to an existing LAG interface
Impact:
Traffic flow gets impacted and the system misses the packets routed onto the LACP trunk to where the LAG member was added.
Workaround:
Restart tmm on all tenants that are associated with the trunk.
Fixed Versions:
17.5.1
1629701-2 : Attack signature is not shown in local event log for staged entity when not in learn/staging
Links to More Info: BT1629701
Component: Application Security Manager
Symptoms:
Attack signature is not shown in local event log for staged entity when the attack signatures are not in learning/staging.
Conditions:
- Security policy with staged URL, parameter or cookie;
- Attack signatures are not in learning or staging;
- Attack is detected by signature in request.
Impact:
Detected attack signature is not shown in local event log.
Workaround:
Possible workarounds:
- enable learning for attack signatures;
- examine detected signatures via remote log (if enabled).
Fix:
Detected attack signatures are now shown also for staged entities.
Fixed Versions:
17.5.1
1628001-4 : TMM core when ACL operation is performed on a deleted session
Links to More Info: BT1628001
Component: Access Policy Manager
Symptoms:
TMM core
Conditions:
A session was deleted while performing an ACL iRule action.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
The TMM crash caused when performing iRule command
"[ACCESS::acl matched]" for a deleted session, this can be mitigated by adding a check for session existence like below
==================
set sessionid [ACCESS::session data get {session.user.sessionid}]
if {[ACCESS::session exists -sid $sessionid]} {
if {[ACCESS::acl matched] eq <ACL NAME>}
{
///Logic
}
} else {
log local0. "Session does not exist"
}
=============
Fixed Versions:
17.5.1
1626337-4 : RPMS not being included in the generated UCS with fix of ID985329 incorporated★
Links to More Info: K81310610, BT1626337
Component: Device Management
Symptoms:
While saving the UCS file after installing iAppLX RPMs, iAppLX RPMs are not included in the UCS file. The issue is observed in BIG-IP running software release that includes fix of ID985329.
Some possible symptoms:
-- AS3 replies with a "404 not found" error after upgrading
-- iAppLX applications that have a GUI, such as SSL Orchestrator, display a "Not Found" or "Access forbidden" error after upggrading
Conditions:
- Saving UCS using either CLI (Command Line Interface) or GUI
- BIG-IP running software release that includes fix of ID985329 (starting with verison 16.1.5, 17.1.2, 17.5.0)
Impact:
iAppLX RPMs and iAppLX declarations will be missing if UCS restore is performed. This can cause issues such as "NotFound" or "Access Forbidden" when trying to access the iAppLX.
This can be encountered following an upgrade from verison 16.1.5, 17.1.2, 17.5.0 to a later version.
Workaround:
Mitigation depends on the iAppLX package you are using because uninstall/reinstall approach is sometimes different.
SSL Orchestrator
Follow the recovery steps in K81310610: SSL Orchestrator Configuration: Access forbidden or Not Found or show wizard of new topology
https://my.f5.com/manage/s/article/K81310610
Access Guided Configuration
Follow the recovery steps in K55177400: Guided configuration displays: Not found - The requested URL was not found on this server
https://my.f5.com/manage/s/article/K55177400.
AS3 or any other manually-installed iAppLX
Follow the recovery steps in K000132348: AS3 declaration failure: mgmt shared service-discovery task update response=404 body
https://my.f5.com/manage/s/article/K000132348
Impact of workaround: uninstalling and reinstalling an iAppLX RPM should not impact the configuration data that the iAppLX was managing; for example uninstalling and reinstalling AS3 will not cause the previously-loaded AS3 declaration to be lost.
Fixed Versions:
17.5.1
1623941-4 : [AD] BIG-IP APM AD Auth agent sometimes prompts for new password (every login) after upgrade★
Links to More Info: BT1623941
Component: Access Policy Manager
Symptoms:
AD Auth agent always prompts for a new password after upgrading from v15.x to v17.1.x The user password is *NOT* expired in Active Directory. The user account does not have the "User must change password at next logon" option checked.
This can be seen any in any version upgrades.
Conditions:
Active Directory auth is configured
Impact:
After the upgrade to v17.1.x, v16.1.x, v15.1.x change password prompt appears every time you log in.
Workaround:
None
Fix:
Added the Client constructer as a part of the Client Initialisation
Fixed Versions:
17.5.1
1623597-3 : Nat46/64 hardware connection re-offload is not optimal.
Links to More Info: BT1623597
Component: TMOS
Symptoms:
Nat46/64 hardware connection re-offload is not optimal.
Conditions:
Nat46/64 configuration with hardware offload (fastl4).
Impact:
Not optimal resource usage.
Workaround:
None
Fixed Versions:
17.5.1
1623197-5 : CVE-2024-37891 urllib3: proxy-authorization request header is not stripped during cross-origin redirects
Links to More Info: K000140711
1622789-3 : Traffic levels for NAT64/46 traffic might be different after an upgrade
Links to More Info: BT1622789
Component: TMOS
Symptoms:
Starting from version 16.X BIG-IP supports hardware acceleration of NAT64/46 traffic. Due to a software defect part of accelerated traffic might not be reported properly in connection statistics.
Conditions:
Nat64/46 virtual server with fastL4 PVA acceleration enabled.
Impact:
Part of accelerated traffic might not be reported properly in connection statistics.
Workaround:
None
Fixed Versions:
17.5.1, 17.1.2
1621269-1 : TMM restart loop when attaching large number of interfaces.
Links to More Info: BT1621269
Component: TMOS
Symptoms:
TMM is unable to finish initialization when attaching 9 or more Intel 710/E810 SR-IOV interfaces.
Conditions:
-- Using 9 or more Intel 710/E810 SR-IOV VFs
Impact:
BIG-IP is unable to go into the Active state because TMM restart loop is present.
Workaround:
Update Mcpd.KeepAliveCount DB variable to 127 and reboot the BIG-IP.
Fix:
DB variable Mcpd.KeepAliveCount was introduced to keep network connections between TMOS proccesses alive longer. Therefore, TMM would have enough time to finish initializing when attaching 9 or more Intel 710/E810 SR-IOV interfaces.
Fixed Versions:
17.5.1
1621185-2 : A BD crash on a specific scenario, even after ID1553989
Links to More Info: BT1621185
Component: Application Security Manager
Symptoms:
A BD crash, failover.
Conditions:
Specific requests under specific conditions.
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
Fix:
Fixed a bd crash while passing traffic.
Fixed Versions:
17.5.1
1620785-4 : F5 cache mechanism relies only on Last-Modified/If-Modified-Since headers and ignores the etag/If-None-Match headers
Links to More Info: BT1620785
Component: Local Traffic Manager
Symptoms:
-- Server has a document x with etag - AAAA
-- When the client requests for x through BIG-IP, BIG-IP caches it and responds with 200 OK.
-- Document on Server changes; new etag is BBBB and cache in BIG-IP is expired
-- Clients sending requests with If None-Match: BBBB, should receive 304 with BBBB response but receiving 200 OK with AAAA.
Conditions:
-- Client having access to the server directly and through BIG-IP with cache enabled.
(Or)
-- Deployment containing two BIG-IPs with caching enabled one at a time.
Impact:
BIG-IP serves old documents when requested with etag of the latest document
Workaround:
When HTTP_REQUEST_RELEASE {
if { [HTTP::header exists If-None-Match] && [HTTP::header exists ETag] }{
HTTP::header remove If-None-Match
}
}
Fixed Versions:
17.5.1
1612885-3 : [PORTAL] Handle error in get_frameElement()
Links to More Info: BT1612885
Component: Access Policy Manager
Symptoms:
You may see get_frameElement() related errors in Devtools Console:
cache-fm-Modern.js:1494 Uncaught TypeError: Cannot read properties of undefined (reading 'document')
Conditions:
Portal Access configured on APM
Impact:
Failure in loading application through Portal Access.
Workaround:
None
Fixed Versions:
17.5.1, 17.1.2
1591813-12 : [APM][SAML] SP automation fails with error message 'cannot update (cert_type)'
Links to More Info: BT1591813
Component: Access Policy Manager
Symptoms:
Whenever a certificate is updated while fetching the metadata from the metadata URL in SAML automation for creating SP connector, an error occurs:
err mcpd[8894]: 01070712:3: Caught configuration exception (0), file:(/Common/sp_cert.crt) cannot update (cert_type).
Conditions:
- Configure BIG-IP as IDP with SP automation objects (metadata URL as internal virtual server URL)
- Configure a internal virtual server and attach an iRule to get the iFile based on the URI.
(https://1.1.1.1/PS0028JP)
-. Update the iFiles that returns metadata and wait till the SP-automation to update its sp-connector objects
PS0028JP -> ifile that returns metadata of SP with different cert ( self signed to CA and viceversa)
Impact:
Connector automation fails to create SP Connectors with new certificates.
Workaround:
None
Fixed Versions:
17.5.1
1591249-5 : CVE-2018-6913 perl: heap buffer overflow in pp_pack.c
Links to More Info: K000141301
1589661-5 : CVE-2019-3860 libssh2: Out-of-bounds reads with specially crafted SFTP packets
Links to More Info: K000149288
1585277-4 : Libexpat through 2.6.1 allows an XML Entity Expansion attack: CVE-2024-28757
Links to More Info: K000139637, BT1585277
1583261-3 : Saml traffic can rarely cause tmm cores
Links to More Info: BT1583261
Component: Access Policy Manager
Symptoms:
Tmm seg faults in saml_sp_crypto_ctx_init.
Conditions:
This was seen when there was a permissions error loading the service provider key.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
17.5.1
1582781-6 : CVE-2021-23177 libarchive: extracting a symlink with ACLs modifies ACLs of target
Links to More Info: K000140961
1580357-2 : CVE-2016-2037 CVE-2015-1197 cpio: out of bounds write
Component: TMOS
Symptoms:
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
Conditions:
Extraction of a crafted archive using the cpio utility.
Impact:
The Vulnerability may lead to out-of-bounds write, potentially causing a crash or arbitrary code execution.
Workaround:
NA
Fix:
Patched cpio to fix the vulnerability.
Fixed Versions:
17.5.1
1579533-3 : Jitterentropy read is restricted to FIPS mode or TMM usage only, for performance reasons★
Links to More Info: BT1579533
Component: Local Traffic Manager
Symptoms:
If jitterentropy-read from CPU jitter is used in all cases, a big performance problem is seen for most cases where BIG-IP works in non-FIPS mode. This can be encountered after upgrading to version 17.x from an earlier BIG-IP version.
Conditions:
The issues occur when BIG-IP operates in non-FIPS or FIPS mode and use jitterentropy to generate seed.
Impact:
Very high CPU utilization is seen when BIG-IP handles traffic while in non-FIPS mode.
Workaround:
None
Fix:
Jitterentropy-read of CPU jitter is now invoked in any one of these situations,
- Either BIG-IP operates in FIPS mode,
- TMM is processing traffic in non-FIPS and FIPS modes. In this case, none of the other components perform the stated jitter read operations and improves performance.
Fixed Versions:
17.5.1
1576897-4 : CVECVE-2016-9063 firefox: Possible integer overflow to fix inside XML_Parse in Expat
Links to More Info: K000139691
1576125-4 : Node.js vulnerability CVE-2024-27983
Links to More Info: K000139532, BT1576125
1572145-5 : CVE-2023-29469 libxml2: Hashing of empty dict strings isn't deterministic
Links to More Info: K000139592
1567761-3 : [APM] AccessProfile name is missing in log User '<username>' belongs to domain '<domain_name>'
Component: Access Policy Manager
Symptoms:
When a user logs in using the VPN using an alternate alias for the domain name, a log message is logged to the apm debug logs. But it does not include the access profile name in the log:
debug apmd[13866]: 0149017b:7: ::c9b6820d: AD module: User 'testuser@mysite.com' belongs to domain 'mysite.net'
Conditions:
User logged in using AD Auth with alternate alias for domain name.
Impact:
The debug log message is ambiguous.
Workaround:
None
Fixed Versions:
17.5.1
1566533-7 : CVE-2017-18342 PyYAML: yaml.load() API could execute arbitrary code
Links to More Info: K000139901
1555525-4 : WCCP traffic may have its source port changed
Links to More Info: BT1555525
Component: Local Traffic Manager
Symptoms:
WCCP traffic may have its source port changed as it leaves the Linux host. This could cause WCCP sessions to not be established.
Conditions:
-- WCCP configured
-- BIG-IP Virtual Edition platform or r2000 or r4000 tenants.
Impact:
WCCP messages may not be successfully processed by the peer because the source port is not 2048.
Workaround:
Cat >> /config/tmm_init.tcl << EOF
proxy BIGSELF {
listen 0.0.0.0%\${rtdom_any} 2048 netmask 0.0.0.0 {
proto \$ipproto(udp)
srcport strict
idle_timeout 30
transparent
no_translate
no_arp
l2forward
tap enable all
protect
}
profile _bigself
}
EOF
bigstart restart tmm
Fixed Versions:
17.5.1, 17.1.2
1552705-6 : New subsession reads access_token from per-session policy instead of per-request policy.
Links to More Info: BT1552705
Component: Access Policy Manager
Symptoms:
When BIG-IP is configured with OAuth Agents both in per-session policy and per-request policy, OAuth Flow fails to execute successfully.
Conditions:
When new subsessions are created TMM fails to read the access token from subsession variables. Therefore, gets the old token from the main session, i.e. per-session policy.
Impact:
BIG-IP Administrator will not be able to configure BIG-IP as OAuth Client & RS with both per-session policy and per-request policy.
Workaround:
Use OAuth Agents only in the per-request policy, configure per-session policy with just empty allow.
Fixed Versions:
17.5.1
1550869-4 : Tmm leak on request-logging or response logging on FTP virtual server
Links to More Info: BT1550869
Component: Local Traffic Manager
Symptoms:
Tmm memory leak is observed.
Conditions:
Either of these conditions:
-- An LTM profile with request-logging enabled
-- response-logging enabled on a virtual server supporting FTP
Impact:
A tmm memory leak occurs.
Workaround:
Disable request/response logging on the FTP virtual server.
Fixed Versions:
17.5.1
1550785-4 : HSB lock up in Syn-Ack generator module
Component: TMOS
Symptoms:
Datapath flow control in HSB RX and TX directions. Datapath lockup detected by BIG-IP.
Conditions:
Syn Cookie feature is enabled.
Impact:
Datapath lockup. Requires reboot.
Workaround:
This has been fixed in all iSeries platforms for BIG-IP versions 15.1.x, 16.1.x, 17.1.x, 15.5.x.
Fixed in these bitfiles and all bitfiles newer than these.
v15.1.x:
ID1757053: HSB v2.10.8.0 bitstream release for VIPRION B2250 blades
ID1759517: HSB v3.8.98.0 bitstream release for VIPRION B44x0 blades
ID1593933: HSB v5.6.10.0 bitstream release for i5000 / i7000 / i10000-series appliances
ID1593929: HSB v5.23.10.0 bitstream release for i11000-series appliances
v16.1.x:
ID1554997: HSB v2.12.6.0 bitsteam release for VIPRION B2250 blades
ID1564281: HSB v3.10.5.0 bitstream release for VIPRION B44x0 blades
ID1572961: HSB v5.8.5.0 bitstream release for i5000 / i7000 / i10000-series appliances
ID1574653: HSB v5.25.4.0 bitstream release for i11000-series appliances
v17.1.x / v17.5.x:
ID1587357: HSB v2.13.5.0 bitsteam release for VIPRION B2250 blades
ID1582633: HSB v3.11.6.0 bitstream release for VIPRION B44x0 blades
ID1587341: HSB v5.9.9.0 bitstream release to AFM for i5000 / i7000 / i10000-series appliances
ID1587349: HSB v5.26.5.0 bitstream release for i11000-series appliances
Fix:
Bug was found and fixed in the Syn-Ack generator module in the FPGA.
First bitfiles with the fix are listed in the Mitigation / Workaround section.
Fixed Versions:
17.5.1
1517561-5 : CVE-2023-28484 libxml2: NULL dereference in xmlSchemaFixupComplexType
Links to More Info: K000139641
1505649-3 : SSL Handshake fall back to full handshake during session resumption, if SNI string is more than 32 characters in length
Links to More Info: BT1505649
Component: Local Traffic Manager
Symptoms:
When the SNI string is longer than 32 characters, the SSL handshake switches to the full handshake when session resumption is attempted.
Conditions:
- SSL resumption should be enabled in the client's SSL profile of their BIG-IP.
- SNI string should be more than 32 characters in length of the SSL client Hello packet received from the user.
Impact:
SSL resumption would fail if the SNI string is more than 32 characters in length.
Workaround:
using strings lesser than 32 characters for SNI
Fixed Versions:
17.5.1, 17.1.2
1495381-3 : TMM core with SWG explicit forward proxy configuration
Links to More Info: BT1495381
Component: Access Policy Manager
Symptoms:
TMM core.
Conditions:
SWG explicit forward proxy with NTLM or Kerberos credentials identification method.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
17.5.1
1494229-5 : CVE-2023-2953 openldap: null pointer dereference in ber_memalloc_x function
Links to More Info: K000138814
1492337-4 : TMM fails to start up using Xnet-DPDK-virtio due to out of bounds MTU
Links to More Info: BT1492337
Component: TMOS
Symptoms:
TMM goes into a restart loop and fails to start with an error message that the MTU is out of bounds
Log message:
notice virtio_mtu_set(): MTU should be between 68 and 1500
Conditions:
- Using Xnet-DPDK-virtio driver
- NIC is configured to have an MTU less than NDAL's configured MTU. By default, this is an MTU < 9198
Impact:
TMM goes into a restart loop and fails to start
Workaround:
Create /config/tmm_init.tcl with the following entry
ndal mtu <value> 1af4:1041
Replacing <value> with the corresponding value in the following log line in /var/log/tmm
notice virtio_mtu_set(): MTU should be between 68 and <value>
Fix:
Refactored code to not restart TMM if set MTU operation fails.
Fixed Versions:
17.5.1
1469393-2 : Browser extension can cause Bot-Defense profile screen to misfunction
Links to More Info: BT1469393
Component: Application Security Manager
Symptoms:
One of the ad-blocker browser extensions is reported to cause bot-defense GUI not working properly.
Conditions:
Ad-blocker extension installed in browser
Impact:
Bot-defense screen might not work properly
Workaround:
Disable ad-blocker extension or use private/incognito mode.
Fixed Versions:
17.5.1
1441577-6 : CVE-2023-42795 tomcat: improper cleaning of recycled objects could lead to information leak
Links to More Info: K000138178
1401961-4 : A blade with a non-functional backplane may override the dag context for the whole system
Links to More Info: BT1401961
Component: TMOS
Symptoms:
A blade with a non-functional backplane may override the dag context for the whole system.
Conditions:
- a blade has backplane problems, as evidenced by "shared random" not being ready in `tmctl -d blade tmm/ready_for_world_stat`.
Impact:
The traffic is black-holed into a non-functional blade.
Workaround:
Depending on the nature of the blade fault, a workaround is to either disable or just reboot the non-functional blade.
Fix:
A blade with a non-functional backplane cannot override the dag context for the whole system anymore.
Fixed Versions:
17.5.1
1400533-5 : TMM core dump include SIGABRT multiple times, on the Standby device.
Links to More Info: BT1400533
Component: Access Policy Manager
Symptoms:
The tmm running on the Standby device is repeatedly killed by sod. There are number of SessionDB ERROR messages on the tmm log.
/var/log/tmm1:
notice session_ha_context_callback: SessionDB ERROR: received invalid or corrupt HA message; dropped message.
Conditions:
-- BIG-IP configured for high availability (HA)
-- Mirroring enabled
-- APM enabled
-- Traffic is being passed on the active device
Impact:
Tmm restarts on the standby device. If a failover occurs while the tmm is restarting, traffic is disrupted.
Workaround:
None
Fix:
Persisting sub-session information only in the active device, after the expiry.
Fixed Versions:
17.5.1
1393733-8 : CVE-2022-43750 kernel: memory corruption in usbmon driver
Links to More Info: K000139700
1382313-5 : TMM might crash under certain conditions
Component: TMOS
Symptoms:
In select scenarios, specific configurations related to DDoS may inadvertently elevate the likelihood of instability within the tmm process.
Conditions:
DDoS configured.
Impact:
Elevated likelihood of instability within the tmm process.
Workaround:
Disable sPVA feature, use the following commands:
tmsh -c 'modify sys db dos.forceswdos value true'
tmsh -c 'list sys db dos.forceswdos'
# this should print "true"
sys db dos.forceswdos {
value "true"
}
Note: This has a performance impact, as all DDoS function is handled in software.
Fix:
tmm does not crash.
Fixed Versions:
17.5.1
1382181-2 : BIG-IP resets only server-side on idle timeout when used FastL4 profile with loose-* settings enabled★
Links to More Info: BT1382181
Component: Local Traffic Manager
Symptoms:
After upgrading to BIG-IP 17.1.0, observed that some of the client sessions are orphaned, this has caused multiple intermittent connection failures when connecting through BIG-IP.
When the FastL4 profile with loose-* settings enabled is used and an idle timeout of 300 seconds, after idle time of 300 seconds, the server-side connection resets but no reset is sent towards client.
Conditions:
- Use BIG-IP version 17.1.0 and above
- Use Fastl4 profile with loose-* settings enabled.
- Configure idle timeout values.
Impact:
Some client sessions will be orphaned and cause intermittent connection failures when trying to connect through BIG-IP.
Workaround:
If not required for a particular use case, then disable loose-close settings in Fastl4 profile.
Fixed Versions:
17.5.1
1353609-8 : ZebOS BGP vulnerability CVE-2023-45886
Links to More Info: K000137315
1352649-4 : The trailing semicolon at the end of [HTTP::path] in the iRule is being omitted.
Links to More Info: BT1352649
Component: Local Traffic Manager
Symptoms:
When a http request with URL containing only one semi-colon at the end, it is omitted with HTTP::PATH
Conditions:
Basic http Virtual Server and request URL with ';' at the end
Impact:
[HTTP::PATH] incorrectly omits ';'
Workaround:
None
Fix:
Count on semicolon for HTTP::PATH even when there is no host-extension
Fixed Versions:
17.5.1
1336185-6 : NodeJS Vulnerability - CVE-2018-12122
Links to More Info: K000137090
1330801-8 : NodeJS Vulnerability CVE-2018-12123, CVE-2018-12121, CVE-2018-12122
Links to More Info: K000137090
1327169-7 : CVE-2023-24329 python: urllib.parse url blocklisting bypass
Links to More Info: K000135921
1309637-5 : Mac masquerade not working after VLAN movement on host interfaces
Links to More Info: BT1309637
Component: Local Traffic Manager
Symptoms:
Connectivity to the floating IP via the masquerade MAC fails when the VLAN is moved across interfaces.
Conditions:
-- BIG-IP is configured with a floating IP on a traffic group
-- MAC masquerade is enabled
-- The VLAN is assigned to a different interface
Impact:
Connectivity to the floating IP address fails following a failover.
Workaround:
After the VLAN movement, delete and reconfigure the MAC masquerade.
Fixed Versions:
17.5.1
1306309-4 : CVE-2023-28709 Apache tomcat: Fix for CVE-2023-24998 was incomplete
Links to More Info: K000135262
1304081-7 : CVE-2023-2650 openssl: Possible DoS translating ASN.1 object identifiers
Links to More Info: K000135178
1301545-7 : CVE-2023-0568 php: 1-byte array overrun in common path resolve code
Links to More Info: K000134747
1292605-4 : Uncaught ReferenceError: ReferenceError: REquest is not defined
Links to More Info: BT1292605
Component: Access Policy Manager
Symptoms:
The Cache-fm-Modern.js file has a typo.
Conditions:
This issue occurs when using Modern JS support EHF.
Impact:
A Javascript error occurs: "Uncaught ReferenceError: ReferenceError: REquest is not defined".
Workaround:
Correct the typo and give the iRule with iFile workaround.
Fix:
The word "REquest" should be "Request" at all the places where there is a typo error.
Fixed Versions:
17.5.1
1282837-4 : DTLS1.2 Handshakes are causing tmm crash with mTLS connection
Component: Local Traffic Manager
Symptoms:
TMM crash will be observed during the DTLS1.2 handshake.
Conditions:
ServerSSL profile configured with,
- key and certificate.
- ssl-sign-hash value is Any
A backend server configured with DTLS1.2 protocol and enabled client authentication.
Impact:
TMM will crash for each DTLS1.2 handshake.
Workaround:
In serverSSL profile, select the ssl-sign-hash to SHA-256.
Fix:
DTLS1.2 handshakes perform as expected.
Fixed Versions:
17.5.1
1270257-8 : CVE-2023-0662 php: DoS vulnerability when parsing multipart request body
Links to More Info: K000133753
1269709-5 : GUI should throw the error when the VS is configured with both vdi and HTTP/2 profiles
Links to More Info: BT1269709
Component: Access Policy Manager
Symptoms:
As the VDI profile is currently not supported in the HTTP/2 environment for which there is no warning message on the BIG-IP GUI about this limitation.
Conditions:
When both VDI Profile and HTTP/2 Profile is attached to the VS.
Impact:
The customer wants this error to be displayed on the BIGIP GUI if vdi and http/2 profiles both are attached to the VS together.
Workaround:
None
Fix:
Display the warning message on the BIG-IP GUI for the Configuration error: "Virtual server cannot have vdi and http/2 profiles at the same time" when both vdi and http/2 profiles are attached on the VS.
Fixed Versions:
17.5.1, 17.1.2, 16.1.5
1267221-5 : When TMM starts, Hyper-V shows no RX packets on the ethX interface★
Links to More Info: BT1267221
Component: Local Traffic Manager
Symptoms:
BIG-IP Virtual Edition (VE) running on a Hyper-V host, when TMM starts, it sets the NIC queue count. When this happens, due to a bug in Hyper-V, ingress packets are no longer received on the data plane interfaces.
Packets egressed from TMM are being correctly sent to peer devices on the network.
Conditions:
- After upgrading from BIG-IP version 12, none of the data plane interfaces show ingress counters incrementing and no traffic is seen on the interface. The Management interface works properly.
Impact:
The data plane interfaces does not show ingress counters incrementing and no traffic is seen on the interface.
Workaround:
In Hyper-V manager, save the machine state and then start it back up or use a legacy network adapter.
Fix:
This change provides a workaround to not set the NIC queue counts if they are already set properly. To utilize this workaround the amount of memory should be verified so that the number of TMMs equals the number of CPUs on the VM.
A new log message in /var/log/tmm will log whether or not TMM changed the queue count.
Fixed Versions:
17.5.1
1144673-5 : Persistent Connection Issue in SSO v2 Plugin
Component: Access Policy Manager
Symptoms:
After a SAML flow is completed and sessions are removed following Single Logout (SLO), some connections may stay active in the flow table if the client does not initiate a reset (RST). The SSO plugin fails to properly manage shutdown events, causing these connections to remain open instead of being closed.
Conditions:
BIG-IP is configured as both a SAML Service Provider (SP) and Identity Provider (IDP), with Single Logout (SLO) enabled, and users remain on the browser after logging out.
Impact:
Persistent connections could lead to resource strain and may affect system performance.
Workaround:
NA
Fix:
No more idle connections in flow table.
Fixed Versions:
17.5.1
1144421-3 : CVE-2019-14866 cpio: improper input validation when writing tar header fields leads to unexpected tar generation
Component: TMOS
Symptoms:
cpio does not properly validate the values written in the header of a TAR file through the to_oct() function. When creating a TAR file from a list of files and one of those is another TAR file with a big size, cpio will generate the resulting file with the content extracted from the input one. This leads to unexpected results as the newly generated TAR file could have files with permissions the owner of the input TAR file did not have or in paths he did not have access to.
Conditions:
Occurs when creating tar archives with unvalidated or specially crafted input filenames.
Impact:
This vulnerability may generate malformed tar files, leading to interoperability issues or unexpected behavior in downstream tools.
Workaround:
NA
Fix:
Patched python to fix the vulnerability.
Fixed Versions:
17.5.1
1132449-6 : Incomplete or missing IPv6 IP Intelligence database results to connection reset and/or high TMM CPU usage
Links to More Info: BT1132449
Component: Advanced Firewall Manager
Symptoms:
The following IPv4 database load message is present in /var/log/ltm:
015c0010:5: Initial load of IPv4 Reputation database has been completed
Note the absence of the IPv6 version of the same message:
015c0010:5: Initial load of IPv6 Reputation database has been completed
Some scenarios can result in elevated TMM CPU utilization, for example, when using IPI in global policy.
The message "Scheduling priority: normal. Nice level: -19" is seen at a rate of about 100 lines per second, per tmm, in the /var/log/tmm* logs:
Conditions:
Failure to download IPv6 database from localdb-ipv6-daily.brightcloud.com.
Impact:
Any of the following:
- TCL error results when IPI is used in an iRule resulting in connection being reset.
- When using IPI in global policy, increased TMM CPU utilization may occur which leads to idle enforcer being triggered, TMM clock advanced messages appearing in LTM logs, or TMM restarting without core when MCPD is unable to communicate with TMM.
Workaround:
Ensure that BIG-IP is able to communicate using https with BrightCloud servers, including localdb-ipv6-daily.brightcloud.com. For more detailed troubleshooting steps, see K03011490 at https://my.f5.com/manage/s/article/K03011490.
Once the IPv6 reputation database has been retrieved and loaded issues should stop.
This line in ltm log shows load has completed:
015c0010:5: Initial load of IPv6 Reputation database has been completed
Fix:
None
Fixed Versions:
17.5.1
1121517-5 : Interrupts on Hyper-V are pinned on CPU 0
Links to More Info: BT1121517
Component: TMOS
Symptoms:
CPU 0 utilization is much higher relative to other CPUs due to high amount of softirq.
Conditions:
BIG-IP is deployed on a Hyper-V platform.
Impact:
Performance is degraded.
Fix:
Interrupts are balanced across all CPUs.
Fixed Versions:
17.5.1, 16.1.4, 15.1.10
1093685-8 : CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it
Links to More Info: K52379673
1081245-3 : [APM] SSO OAuth Bearer passthrough inserts an old access token instead of the latest one.
Links to More Info: BT1081245
Component: Access Policy Manager
Symptoms:
SSO Bearer authorization fails.
Conditions:
APM PRP is configured with just an OAuth Scope and SSO Bearer attached to PSP.
Impact:
Fails to read new token from request and forwards old token in session variables to backend pool after validation.
Workaround:
1. Configure a PSP of type 'OAuth-RS'
a. Add OAuth Scope
b. Add Variable assign with following expression
apm policy agent variable-assign /Common/RStype_AP_act_variable_assign_ag {
variables {
{
expression "mcget {session.oauth.client.last.access_token}"
secure true
varname session.oauth.client./Common/oauth-aad-server.access_token
}
}
}
2. Configure PRP with Gating Criteria (As per your setup)
a. Add a Variable-Assign inside SBR (subroutine)
apm policy agent variable-assign /Common/empty_act_variable_assign_ag {
variables {
{
expression "mcget -secure {subsession.oauth.client.last.access_token}"
secure true
varname session.oauth.client./Common/oauth-aad-server.access_token
}
}
}
Fix:
N/A
Fixed Versions:
17.5.1
1078713-1 : Windows 11 not included in client OS check and Windows Info agent.
Links to More Info: BT1078713
Component: Access Policy Manager
Symptoms:
Branches/rules are not available for Windows 11 in the access policy.
Conditions:
-- Client OS check.
-- Windows Info agent.
Impact:
Unable to use client OS check and Windows Info agent for Windows 11.
Workaround:
Windows 10 and 11 share the same major and minor version and Windows 11 is differentiated by its build number, 22000.
Adding a "Windows Registry" agent such as this before the "Windows Info" agent do branch off Windows 11 machines.
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion"."CurrentBuildNumber">="22000"
Fix:
N/A
Fixed Versions:
17.5.1
1069949-8 : CVE-2018-1000007 curl: HTTP authentication leak in redirects
Component: TMOS
Symptoms:
libcurl might accidentally leak authentication data to third parties.
When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value.
Sending the same set of headers to subsequent hosts is, in particular, a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy-sensitive information or data that could allow others to impersonate the libcurl-using client's request.
Conditions:
NA
Impact:
Sensitive information could be disclosed to an unauthorised user
Workaround:
NA
Fix:
Patched curl to fix the vulnerability.
Fixed Versions:
17.5.1
1057141-7 : CVE-2018-14647 python: Missing salt initialization in _elementtree.c module
Component: TMOS
Symptoms:
A flaw was found in python's _elementtree.c module, a wrapper for libexpat XML parser. xml.etree C accelerator don't call XML_SetHashSalt(), failing to properly initiate the random hash seed from a good CSPRNG source and making hash collision attacks with carefully crafted XML data easier.
Conditions:
NA
Impact:
potential service disruptions.
Workaround:
NA
Fix:
Patched python to fix the vulnerability.
Fixed Versions:
17.5.1
1052249-8 : CVE-2018-13094 kernel: NULL pointer dereference in xfs_da_shrink_inode function
Component: TMOS
Symptoms:
An issue was discovered in the XFS filesystem in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel. A NULL pointer dereference may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. This can lead to a system crash and a denial of service.
Conditions:
NA
Impact:
Exploitation of the vulnerability could cause the system to become unavailable (DoS).
Workaround:
Limit physical or local access to the system
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
17.5.1
1052217-8 : CVE-2018-19985 kernel: oob memory read in hso_probe in drivers/net/usb/hso.c
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel in the function hso_probe() which reads if_num value from the USB device (as an u8) and uses it without a length check to index an array, resulting in an OOB memory read in hso_probe() or hso_get_config_data(). An attacker with forged USB device with a physical access to a system (needed to connect such a device) can cause a system crash and a denial-of-service.
Conditions:
NA
Impact:
The primary impact of this vulnerability is a denial-of-service (DoS) due to the kernel crash
Workaround:
NA
Fix:
Patched kernel to fix the vulnerability.
Fixed Versions:
17.5.1
1047789-1 : [APM] MCP err msg seen when editing/applying resource assign in VPE
Links to More Info: BT1047789
Component: TMOS
Symptoms:
An error message is found in /var/log/apm
MCP message handling failed in 0xb0ad80 (16973840): Sep 3 09:56:22 on 2 - MCP Message:
Conditions:
When VPE (or via CLI) "Advanced Resource Assign" agent is re-configured
Impact:
No functional impact.
Workaround:
None
Fixed Versions:
17.5.1
1041141-3 : CVE-2021-35942 glibc: Arbitrary read in wordexp()
Links to More Info: K98121587
1028701-12 : CVE-2019-9947 python: CRLF injection via the path part of the url passed to urlopen()
Links to More Info: K000151516
Known Issues in BIG-IP v17.5.x
TMOS Issues
ID Number | Severity | Links to More Info | Description |
967769-4 | 2-Critical | BT967769 | During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks |
777389-8 | 2-Critical | BT777389 | In rare occurrences related to PostgreSQL monitor, the mcpd process restarts |
742764-5 | 2-Critical | BT742764 | If two racoon daemon are spawned on startup, one fails and cores. |
721591-4 | 2-Critical | K000141369, BT721591 | Java crashes with core during with high load on REST API |
566756-3 | 2-Critical | BT566756 | VCMP 4 cores on 3 blades : mcpd core when delete 255 dos profiles via tmsh command while machine is idle |
1966589 | 2-Critical | BT1966589 | Changes to fixup scripts breaks schema upgrade★ |
1943217 | 2-Critical | BT1943217 | BGP - using 'no bgp default ipv4-unicast' might lead to a crash |
1787621-2 | 2-Critical | BT1787621 | TMM may unexpectedly restart during IPsec tunnel negotiation |
1678105-3 | 2-Critical | BT1678105 | F5OS tenant, TMM crashing after loading a UCS |
1571817-4 | 2-Critical | BT1571817 | FQDN ephemeral pool member user-down state is not synced to the peer device |
1395349-1 | 2-Critical | BT1395349 | The httpd service shows inactive/dead after "bigstart restart httpd" |
1305117-2 | 2-Critical | BT1305117 | SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0★ |
1277389-1 | 2-Critical | BT1277389 | HSB transmitter lockup |
1093717-6 | 2-Critical | BT1093717 | BGP4 SNMP traps are not working. |
941961-6 | 3-Major | BT941961 | Upgrading system using WAM TCP profiles may prevent the configuration from loading |
923745-6 | 3-Major | BT923745 | Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition |
904401-7 | 3-Major | BT904401 | Guestagentd or devmgmtd core |
1967589-2 | 3-Major | BT1967589 | Using tmsh to query iControl REST (tmsh list mgmt ...) commands consume an auth token and does not get removed immediately |
1966941-2 | 3-Major | BT1966941 | High CPU or increased translation errors following upgrade or restart when DAG distribution changes |
1958033-1 | 3-Major | BT1958033 | MCPD validates only one ssl profile when a virtual server attached to http/2 profile with enforce-tls-requirements enabled along with multiple clientssl profiles with anyone has renegotiation option enabled |
1943669 | 3-Major | BT1943669 | "Automatic Update Check & Automatic Phone Home features" settings is changed upon running 'load sys config current-partition' in other partition |
1938345 | 3-Major | F5 on AWS : Unable to Launch F5 BigIP instance with latest firmware 17.5.0 in AWS★ | |
1936469-1 | 3-Major | BT1936469 | Multiple Ctrl-Alt-Delete signals in virtual console reboots BIG-IP Virtual Edition |
1936233-1 | 3-Major | BT1936233 | TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail |
1933105-3 | 3-Major | BT1933105 | TMM does not fragment the output before encapsulating the payload |
1928749-2 | 3-Major | BT1928749 | TMM cores in rare circumstances |
1927521-1 | 3-Major | BT1927521 | DPDK has dependency on SSSE3 |
1927165 | 3-Major | BT1927165 | Fix rare race condition that could cause crash during TMM startup |
1922617-3 | 3-Major | BT1922617 | BGP Multipath selection might be unpredictable. |
1893989-1 | 3-Major | BT1893989 | NTP truncates symmetric keys to 30 bytes |
1890749-2 | 3-Major | BT1890749 | In a multi-user scenario, the system is allowing users to create more authentication tokens than the maximum limit allowed per user. |
1881569-4 | 3-Major | BT1881569 | Programs invoked by tmsh when session is interrupted may remain running |
1856449-1 | 3-Major | BT1856449 | [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck. |
1854353-3 | 3-Major | BT1854353 | Users with Resource admin role are not able to save the UCS. |
1853721-3 | 3-Major | BT1853721 | User has reached maximum active login tokens |
1849265-4 | 3-Major | BT1849265 | A VCMP guest may not exit hardware syncookie mode |
1826273-2 | 3-Major | BT1826273 | Mysql client uses TLS1.1 when connecting to mysql server running 5.7 |
1788193-3 | 3-Major | BT1788193 | [MCP] Request logging should only be allowed with supported protocol profiles |
1784137-1 | 3-Major | BT1784137 | Net stp-globals object config-name back to default value upon reboot |
1755413-2 | 3-Major | BT1755413 | Fast scp file transfer may not display progress bar |
1753489-2 | 3-Major | BT1753489 | BFD Commands Missing in ZebOS Config After Reboot or Restart for large configurations |
1670625-3 | 3-Major | BT1670625 | Incorrect set of TCAM rules |
1615081-4 | 3-Major | BT1615081 | Remove SHA and AES Constraint Checks in SNMPv3 |
1602629-4 | 3-Major | BT1602629 | Tmm_mcpmsg_print can trigger SOD |
1599841-1 | 3-Major | BT1599841 | Partition access is not synced to Standby device after adding a remote user locally. |
1596313-2 | 3-Major | BT1596313 | Deleting and re-adding a LAG on F5OS causes a validation failure in mcpd, therefore the trunk on the tenant has no interfaces |
1586745-2 | 3-Major | BT1586745 | LACP trunk status became DOWN due to bcm56xxd failure |
1560449-2 | 3-Major | BT1560449 | Rest_logintegrity does not suppress output to stderr |
1403869-5 | 3-Major | BT1403869 | CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop |
1322413-5 | 3-Major | BT1322413 | After config sync, FQDN node status changes to Unknown/Unchecked on peer device |
1316481-4 | 3-Major | Large CRL file update fails with memory allocation failure | |
1230109-1 | 3-Major | BT1230109 | Mcpd memory and CPU increase while getting route stats |
1168245-1 | 3-Major | BT1168245 | Browser is intermittently unable to contact the BIG-IP device |
1106489-5 | 3-Major | BT1106489 | GRO/LRO is disabled in environments using the TMM raw socket "sock" driver. |
1105361-2 | 3-Major | BT1105361 | Unable to deploy BIG-IP on Azure with D series(v5) or E series(v5) instance types★ |
1040277-8 | 3-Major | BT1040277 | Syslog-ng issue may cause logging to stop and possible reboot of a system |
1032001-4 | 3-Major | BT1032001 | Statemirror address can be configured on management network or clusterd restarting |
1029173-6 | 3-Major | BT1029173 | MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL |
1968193-1 | 4-Minor | BT1968193 | Management Route name displayed incorrectly via API when the route name contains a forward slash (/) |
1966053-1 | 4-Minor | BT1966053 | MCPD memory leak in firewall |
1959785-2 | 4-Minor | BT1959785 | BIG-IP incorrectly marked as "Managed by BIG-IQ" by its BIG-IP HA peer |
1934457-4 | 4-Minor | BT1934457 | Cursor in BIG-IP Configuration Utility iRule editor appears in the incorrect position |
1828005-1 | 4-Minor | BT1828005 | Syslog message does not carry log level when destination is remote |
1688545-2 | 4-Minor | BT1688545 | PVA-processed traffic is not included in the route-domain stats via SNMP |
1589421-1 | 4-Minor | BT1589421 | LTM Monitor not shown in Pool Member "Health Monitors" if Transparent attribute changes |
1325737-1 | 4-Minor | BT1325737 | Standby tenant cannot access floating traffic group when MAC masquerade is enabled |
1295217-1 | 4-Minor | BT1295217 | When provision.1nic is set to forced_enable the mgmt interface does not respond to ICMP |
1089625-3 | 4-Minor | BT1089625 | Java core dump with SIGABRT while high cpu load in BIG-IP |
Local Traffic Manager Issues
ID Number | Severity | Links to More Info | Description |
1785385-2 | 1-Blocking | BT1785385 | Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0★ |
939989-5 | 2-Critical | BT939989 | TMM may be killed by sod when shutting down |
1965329-1 | 2-Critical | BT1965329 | TMM may crash when re-declaring an LTM policy with a data-group |
1937589-1 | 2-Critical | BT1937589 | LTM v17.5.0 f5-irule.crt is valid only until Jul 2027 |
1935053-3 | 2-Critical | BT1935053 | Impact of crypto queue limits on SSL handshake reliability |
1921085-1 | 2-Critical | BT1921085 | Core file generated when using FTP::ftps_mode require without SSL profile in TCP filter |
1921049-1 | 2-Critical | BT1921049 | When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM |
1854137-1 | 2-Critical | BT1854137 | Verified accept and pool reselect-tries may cause TCP proxy to core |
1825357-2 | 2-Critical | BT1825357 | Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk |
1481889-4 | 2-Critical | BT1481889 | High CPU utilization or crash when CACHE_REQUEST iRule parks. |
1100249-6 | 2-Critical | BT1100249 | SNAT with FLOW_INIT firewall rule may core TMM due to wrong type of underlying flow structure |
1091021-7 | 2-Critical | BT1091021 | The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive. |
1073897-5 | 2-Critical | BT1073897 | TMM core due to memory corruption |
1009161-5 | 2-Critical | BT1009161 | SSL mirroring protect for null sessions |
966785-7 | 3-Major | BT966785 | Rate Shaping stops TCP retransmission |
932461-9 | 3-Major | BT932461 | Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate. |
905477-8 | 3-Major | BT905477 | The sdmd daemon cores during config sync when multiple devices configured for iRules LX |
901569-7 | 3-Major | BT901569 | Loopback traffic might get dropped when VLAN filter is enabled for a virtual server. |
870349-5 | 3-Major | BT870349 | Continuous restart of ntlmconnpool after the license reinstallation★ |
783077-4 | 3-Major | BT783077 | IPv6 host defined via static route unreachable after BIG-IP reboot |
739475-9 | 3-Major | BT739475 | Site-Local IPv6 Unicast Addresses support. |
673060-2 | 3-Major | BT673060 | SSL handshake failure with Session Ticket enabled on the backend server |
1962813-4 | 3-Major | BT1962813 | The csyncd daemon on one or more of the cluster's secondary blades does not synchronise RRD files from the primary★ |
1959629-1 | 3-Major | BT1959629 | CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown. |
1952557-1 | 3-Major | BT1952557 | DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server |
1943257-1 | 3-Major | BT1943257 | HTTP monitor "last error" string sends incorrect response |
1935713-2 | 3-Major | BT1935713 | TMM crash when handling traffic over vlangroup with autolasthop disabled. |
1934397-2 | 3-Major | BT1934397 | SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants |
1934157-2 | 3-Major | BT1934157 | Http2 monitor fails if a pool is used for routing to pool members |
1930897-1 | 3-Major | BT1930897 | Tmm core due to overflow of ifc ref counts with flow forwarding |
1929045-3 | 3-Major | BT1929045 | TMM may core after HTTP::respond used for first request on iSession connection |
1928169-1 | 3-Major | BT1928169 | HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly |
1921069-2 | 3-Major | BT1921069 | The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA |
1889861-3 | 3-Major | BT1889861 | Passive monitoring with ASM might not log the server response. |
1889741-2 | 3-Major | BT1889741 | Need for the SYS DB variable to toggle ssl_crypto::queue_max |
1849029 | 3-Major | BT1849029 | Debug TMM crashes in FIPS/CC mode |
1824985-3 | 3-Major | BT1824985 | In rare cases the Nitrox hardware compression queue may stop servicing requests. |
1824521-2 | 3-Major | BT1824521 | GUI: VLAN names are not populated while creating the vlan-group under Network Quick configuration |
1788065-1 | 3-Major | BT1788065 | The rule cannot be deleted because it is in use by a rule |
1758961-4 | 3-Major | BT1758961 | TMM may core if proxy_common_init errors out due to inappropriate NAT configuration |
1708189-3 | 3-Major | BT1708189 | ICMP errors with HSL can rarely cause tmm cores |
1697041-2 | 3-Major | BT1697041 | TMM may fail to start, device is inoperative★ |
1624557-3 | 3-Major | BT1624557 | HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content |
1623921-3 | 3-Major | BT1623921 | IPencap monitor probes from bigd are prone to connection re-use. |
1602641-5 | 3-Major | BT1602641 | Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections. |
1598381-1 | 3-Major | BT1598381 | Unable to set the key-usage setting while renewing the CSR |
1596637-2 | 3-Major | BT1596637 | TLS1.3 with c3d and ocsp handshake failure |
1581685-4 | 3-Major | BT1581685 | iRule 'members' command counts FQDN pool members. |
1553169-4 | 3-Major | BT1553169 | Parsing tcp payload using iRules can be inaccurate because of binary to string conversion |
1549397-4 | 3-Major | BT1549397 | Pool member from statically-configured node deleted along with ephemeral pool member using same IP address |
1474877-4 | 3-Major | BT1474877 | Unable to download large files through VIP due RST Compression error. |
1473913-6 | 3-Major | BT1473913 | Proxy Connections drop due to wrong counting |
1411365-1 | 3-Major | BT1411365 | CMP forwarded flows can be removed by other CMP forwarded flows incorrectly |
1273161-5 | 3-Major | BT1273161 | Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades |
1231889-5 | 3-Major | BT1231889 | Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances |
1190753-1 | 3-Major | BT1190753 | HTTP/2 Virtual Server ignores customized HTTP known-methods list |
1128033-4 | 3-Major | BT1128033 | Neuron client constantly logs errors when TCAM database is full |
1125381-5 | 3-Major | BT1125381 | Extraneous warnings recorded in when using only intermediate certificates |
1110485-7 | 3-Major | BT1110485 | SSL handshake failures with invalid profile error |
1091785-7 | 3-Major | BT1091785 | DBDaemon restarts unexpectedly and/or fails to restart under heavy load |
1012009-5 | 3-Major | BT1012009 | MQTT Message Routing virtual may result in TMM crash |
990173-8 | 4-Minor | BT990173 | Dynconfd repeatedly sends the same mcp message to mcpd |
932553-9 | 4-Minor | BT932553 | An HTTP request is not served when a remote logging server is down |
1964933-2 | 4-Minor | BT1964933 | HTTP2 RST flood detection should allow for legitimate case |
1953369-1 | 4-Minor | BT1953369 | DB monitor queries repeatedly if recv string configured but response does not match |
1933965-2 | 4-Minor | BT1933965 | Unable to associate multiple cert/keys of different types to Certificate Key Chain via TMSH |
1930841-1 | 4-Minor | BT1930841 | Tmsh show sys conn virtual-server may report an incomplete set of flows after a virtual server modification |
1926733-1 | 4-Minor | BT1926733 | Tmm memory leak with L7 response policy |
1921025-1 | 4-Minor | BT1921025 | Need more information when http2 RST STREAM |
1670225-4 | 4-Minor | BT1670225 | 'Last Error' field remains empty after initial monitor Down status post-reboot |
1329509-4 | 4-Minor | BT1329509 | TCL error 'ERR_VAL (line 1) invoked from within "HTTP::path"'. |
1004953-7 | 4-Minor | BT1004953 | HTTP does not fall back to HTTP/1.1★ |
Performance Issues
ID Number | Severity | Links to More Info | Description |
1959361 | 3-Major | When running a tenant with more than 72 VCPUs / cores, adminstall crashes | |
1574521-2 | 5-Cosmetic | BT1574521 | Intermittent high ICMP latency on R4000 and R2000 tenants |
Global Traffic Manager (DNS) Issues
ID Number | Severity | Links to More Info | Description |
1821089-4 | 2-Critical | BT1821089 | DNS64 and resolver cache may not function together as expected |
1970969-1 | 3-Major | BT1970969 | Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache |
1953273-1 | 3-Major | BT1953273 | Big3d high CPU with thousands of https monitors with SNI |
1824113-3 | 3-Major | BT1824113 | GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent. |
1824009-3 | 3-Major | BT1824009 | When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client |
1782137-2 | 3-Major | BT1782137 | Management of Wide IPs using the GUI may fail when multiple monitors exist |
1592209-3 | 3-Major | BT1592209 | Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot |
1083405-7 | 3-Major | BT1083405 | "Error connecting to named socket" from zrd |
Application Security Manager Issues
ID Number | Severity | Links to More Info | Description |
1952821-2 | 2-Critical | WAF guided configuration shows a warning message instead list of available configurations | |
1934373-2 | 2-Critical | BT1934373 | DoS attack is blocking while transparent |
1798601-4 | 2-Critical | BT1798601 | BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES★ |
902445-5 | 3-Major | BT902445 | ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation |
1938101-1 | 3-Major | BT1938101 | Performance issue on specific parameters extractions |
1938085-1 | 3-Major | BT1938085 | Performance issue on specific parameters extractions |
1927225-2 | 3-Major | BT1927225 | Vertical tab (u000b) is removed by the JSON parser from the request |
1856513-2 | 3-Major | BT1856513 | Tomcat fails to write log messages to /usr/share/tomcat/logs/liveupdate.log |
1849585-2 | 3-Major | BT1849585 | A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation |
1813717-4 | 3-Major | BT1813717 | Some blocked requests are not logged when filtered by response status codes |
1755113-4 | 3-Major | BT1755113 | BD crash with specific JSON schema |
1677905-4 | 3-Major | BT1677905 | Performance improvement on a specific scenario |
1350485-2 | 3-Major | BT1350485 | When the parameter value contains at (@), domain name is not extracting properly |
974409-6 | 4-Minor | False Positive "Surfing Without Human Interaction" | |
1970193-2 | 4-Minor | Case WAF policy IP address exception list on GUI: Missing Route Domain ID in the IP address | |
1962073-1 | 4-Minor | BT1962073 | Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy |
1933061-1 | 4-Minor | BT1933061 | Changing "bot category" of an user-defined bot-signature should be validated and denied when the change is not appropriate |
1900621-2 | 4-Minor | BT1900621 | Missing client ip |
1890997-1 | 4-Minor | BT1890997 | TCP connection stall in TMM conn table with ASM policy and no websocket profile |
1821353-2 | 4-Minor | BT1821353 | Error on long wildcard configuration |
1783217-1 | 4-Minor | BT1783217 | Rare bd crash |
1782057-2 | 4-Minor | BT1782057 | BD crash related to dns lookup |
1505257-2 | 4-Minor | BT1505257 | False positive with "illegal base64 value" for Authorization header |
1036289-1 | 4-Minor | BT1036289 | Signature ID not displayed in Attack Signature details |
1036221-3 | 4-Minor | BT1036221 | "Illegal parameter value length" is reported with parsing product length. |
Application Visibility and Reporting Issues
ID Number | Severity | Links to More Info | Description |
1932965-1 | 2-Critical | BT1932965 | AVRD may crash at startup due to non-thread-safe version of BOOST json Spirit parser |
1848577-2 | 2-Critical | BT1848577 | VCMP guest stats are not visible on vCMP host GUI nor CLI |
939933-8 | 3-Major | BT939933 | Monpd restarts every few seconds due to missing of AVR database |
1937717-1 | 3-Major | BT1937717 | AVR increases the Content-Length header but fails to inject the CSPM script into the payload |
1298225-1 | 4-Minor | BT1298225 | Avrd generates core when dcd becomes unavailable due to some reason |
Access Policy Manager Issues
ID Number | Severity | Links to More Info | Description |
1957157-1 | 2-Critical | BT1957157 | [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck. |
1819813-2 | 2-Critical | BT1819813 | [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381 |
1020881-3 | 2-Critical | BT1020881 | TMM crashes while passing APM traffic. |
1969861-1 | 3-Major | BT1969861 | [APM][NTLM]ECA core SIGSEGV |
1968169-2 | 3-Major | BT1968169 | [APM][CitrixIntegration]Apps do not launch unless "Accounts" is selected in Citrix Workspace App |
1967261-3 | 3-Major | RDP Parameter "enablerdsaadauth" when added to RDP setting causes file to be corrupted | |
1965849-1 | 3-Major | BT1965849 | [APM] TMM core is observed in validating the saml assertion signature |
1965257-1 | 3-Major | BT1965257 | upgrade to 17.5.0 results in Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576) error is seen in ltm log |
1928157-1 | 3-Major | BT1928157 | [APM][SAML] constant SIGSEGV "in saml_sp_finish_message_signing" after upgrade to 17.1.x★ |
1848565-2 | 3-Major | BT1848565 | Error during updating device details: Internal error (Json parser error) |
1826013-1 | 3-Major | K000150397, BT1826013 | BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters★ |
1756897-2 | 3-Major | BT1756897 | [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node' |
1607277-4 | 3-Major | BT1607277 | Permission Denied error when trying to download the Windows Client Package from Connectivity Profile on Standby |
1587453-2 | 3-Major | BT1587453 | “default-all” profile is selected by default in “Dynamic LAN address spaces” |
1586405-3 | 3-Major | BT1586405 | "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page |
1290937-2 | 3-Major | 'contentWindow' of a dynamically genereated iframe becomes null | |
1074285-4 | 3-Major | BT1074285 | Apmd crashes while handling JWT tokens. |
937665-3 | 4-Minor | BT937665 | Relaystate in SLO request results in two Relaystates in SLO Response |
1856425-1 | 4-Minor | BT1856425 | Old EPSEC images keeps coming back on standby device after reboot |
1825253-1 | 4-Minor | BT1825253 | Enhance the log message for better readability User session was terminated due to IP address change during session |
Service Provider Issues
ID Number | Severity | Links to More Info | Description |
1268373-8 | 2-Critical | BT1268373 | MRF flow tear down can fill up the hudq causing leaks |
1952881-1 | 3-Major | BT1952881 | Tmm memory leak in SCTP metadata |
Advanced Firewall Manager Issues
ID Number | Severity | Links to More Info | Description |
1410441-3 | 2-Critical | BT1410441 | Large file transfer over SFTP/SSH proxy failure |
935769-8 | 3-Major | BT935769 | Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time★ |
1965497 | 3-Major | BT1965497 | Firewall Policy is not effective when the same rule list is attached to two different firewall policies. |
1957977-2 | 3-Major | BT1957977 | Auto-learned DoS Vector attack is detected even with low rate of traffic on HA Pair during Failover★ |
1943593-2 | 3-Major | BT1943593 | Inconsistent DoS Attack Status between tmctl/event logs and GUI |
1820489-2 | 3-Major | BT1820489 | Rule list order changes when modifying a rule using Filer Active Rules List |
1510477-4 | 3-Major | BT1510477 | RD rule containing zones does not match expected traffic on the Network firewall policy |
1365769-2 | 3-Major | BT1365769 | When multiple vlans are in the zone, only some vlans match the ACL-Policy |
1282029-1 | 3-Major | BT1282029 | Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★ |
1917677-4 | 4-Minor | BT1917677 | "show security ip-intelligence info address" may fail to query legacy IP Reputation database |
1880441-2 | 4-Minor | BT1880441 | Security log profile IPI options are visible for configuration in UI but not allowed |
Policy Enforcement Manager Issues
ID Number | Severity | Links to More Info | Description |
1399017-6 | 2-Critical | BT1399017 | PEM iRule commands lead to TMM crash |
1934073-2 | 3-Major | BT1934073 | PEM policy rule incorrectly matching when using a flow condition |
1932161-3 | 3-Major | BT1932161 | PEM iRule usage memory leak |
Traffic Classification Engine Issues
ID Number | Severity | Links to More Info | Description |
1820573-2 | 3-Major | BT1820573 | PEM Traffic Classification signatures are classifying the youtube videos with quic enabled as udp.quic instead of udp.quic.youtube.youtube_video.youtube_video_abr on windows using the latest chrome web browser |
Device Management Issues
ID Number | Severity | Links to More Info | Description |
718796-9 | 2-Critical | BT718796 | iControl REST token issue after upgrade★ |
563144-6 | 3-Major | BT563144 | Changing the system's admin user causes many errors in the REST framework. |
Protocol Inspection Issues
ID Number | Severity | Links to More Info | Description |
1854461-2 | 3-Major | BT1854461 | Unable to delete file from "Available to Deploy" when removed from "Available to Install" |
1787981-3 | 3-Major | BT1787981 | Memory leak in ips_pcb_cache |
SSL Orchestrator Issues
ID Number | Severity | Links to More Info | Description |
1927829-1 | 3-Major | BT1927829 | SSL Orchestrator resets connection with connector abort waiting for data from an inline service |
1849829-2 | 3-Major | BT1849829 | Deprecation of dnssec-lookaside and dnssec-enable Directives in latest BIND release |
1589269-3 | 3-Major | BT1589269 | The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★ |
1934845-1 | 4-Minor | BT1934845 | Transparent proxy loses APM session variables in SSL Orchestrator service |
Bot Defense Issues
ID Number | Severity | Links to More Info | Description |
1820833-1 | 3-Major | BT1820833 | General Database Error when creating a new profile |
F5OS Messaging Agent Issues
ID Number | Severity | Links to More Info | Description |
1881509-1 | 3-Major | BT1881509 | Platform Agent not logging Trunk changes from F5OS |
1690005-2 | 3-Major | BT1690005 | Masquerade Mac is not removed when F5OS is rebooted |
1881537-1 | 5-Cosmetic | BT1881537 | Platform Agent does not log diff of Feature Info Attributes |
1280141-4 | 5-Cosmetic | BT1280141 | Platform agent to log license info when received from platform |
Known Issue details for BIG-IP v17.5.x
990173-8 : Dynconfd repeatedly sends the same mcp message to mcpd
Links to More Info: BT990173
Component: Local Traffic Manager
Symptoms:
If dynconfd sends a single message to mcpd containing two or more operations, and one of the operations fails mcpd validation, dynconfd repeatedly sends same message to mcpd.
An example of two operations in one mcp message would be an ephemeral node creation and an ephemeral pool member creation in a single mcp message.
Once one such message fails, dynconfd repeatedly attempts to resend the same message. In addition, at the next DNS query interval, dynconfd may create one or more new instances of such messages, which may each be retried if they fail. The result can cause an increasing accumulation of MCP messages sent by dynconfd which must be processed by mcpd.
Conditions:
This can occur when:
-- Using FQDN nodes and FQDN pool members.
-- There is an additional issue where the message from dynconfd fails validation within mcpd (e.g., a misconfiguration in which the monitor assigned to the pool is configured with a wildcard destination and the pool member is added to the pool with a port of '0' or 'any'.
Impact:
MCP messages from dynconfd which fail due to an error might cause the population of ephemeral nodes and pool members to fail and become out of sync with what the DNS server is resolving.
By repeatedly resending the same messages, which fail repeatedly, dynconfd causes increased mcpd CPU utilization.
Eventually, the load caused by processing an increasing accumulation of MCP messages may cause increasing and excessive memory usage by mcpd and a possible mcpd core, or may cause mcpd to become busy and unresponsive and be killed/restarted by SOD.
Workaround:
Examine the LTM logs for mcpd error messages indicating failed attempts to create ephemeral nodes or ephemeral pool members, and resolve the cause of the failed node or pool-member creation.
974409-6 : False Positive "Surfing Without Human Interaction"
Component: Application Security Manager
Symptoms:
When using Bot Defense profile, and an application contains many HTML pages which are not qualified (not even accept: text/html), a "Surfing Without Human Interaction" anomaly is mis-counted and falsely raised.
Conditions:
-- Bot Defense Profile is attached to a virtual server.
-- The application contains many HTML pages which can be detected as such from the request.
Impact:
Real clients might or might not be blocked, it depends on the environment.
Workaround:
None.
967769-4 : During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks
Links to More Info: BT967769
Component: TMOS
Symptoms:
Tmm crashes and restarts. The following panic message is found in /var/log/tmm:
notice panic: ../dev/hsb/if_hsb.c:6129: Assertion "HSB lockup, see ltm and tmm log files" failed.
Conditions:
-- Some error or glitch is detected on the high-speed bus (HSB).
-- Software commands a reset of the HSB and interface hardware.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
966785-7 : Rate Shaping stops TCP retransmission
Links to More Info: BT966785
Component: Local Traffic Manager
Symptoms:
When rate shaping is applied to a virtual server, the BIG-IP system does not retransmit unacknowledged data segments, even when the BIG-IP system receives a duplicate ACK.
Conditions:
This issue occurs when both of the following conditions are met:
-- Virtual server configured with a rate shaping.
-- Standard type of virtual server.
Impact:
The BIG-IP system does not retransmit unacknowledged data segments.
Workaround:
None
941961-6 : Upgrading system using WAM TCP profiles may prevent the configuration from loading
Links to More Info: BT941961
Component: TMOS
Symptoms:
If a BIG-IP is on version 13.1.0 through 15.1.x and has profiles in use that use wam-tcp-wan-optimized and/or wam-tcp-lan-optimized as parent profiles, then when the configuration is upgraded to 16.0.0, the configuration fails to load, with an error similar to:
err mcpd[10087]: 01020036:3: The requested parent profile (/Common/wam-tcp-wan-optimized) was not found.
On devices that are provisioned with not just the LTM module this may lead to an out of memory condition as the config load failure prevents memory provisioning completing leaving too little 4KB page (host) memory and too much huge page memory.
If suffering memory pressure then management access to device will be sluggish or not possible.
Conditions:
-- Upgrading from version 13.1.0 through 15.1.x.
-- Using profiles derived from wam-tcp-wan-optimized and/or wam-tcp-lan-optimized.
Impact:
Configuration does not load.
Workaround:
Remove these profiles and adjust the configuration elements that use them accordingly. If it is difficult to work on the device it may be necessary to rollback to earlier version and make changes there. Usually it would be better then to delete newer software volume and reinstall it at which point the modified config will be copied across and installed on newer volume.
Here are two examples:
-- Copy the definition of 'wam-tcp-wan-optimized' from /defaults/wam_base.conf into /config/bigip.conf, and then reload the configuration.
-- Change the references to wam-tcp-wan-optimized to something else in your config file (e.g., tcp-wan-optimized), and then reload the configuration.
939989-5 : TMM may be killed by sod when shutting down
Links to More Info: BT939989
Component: Local Traffic Manager
Symptoms:
In rare cases, TMM may be killed by sod while it is shutting down.
Conditions:
Conditions vary, but this may commonly occur with platforms using the xnet driver with SR-IOV. This includes certain VE platforms as well as VELOS R2xxx R4xxx.
Impact:
A core file is created in /var/core/.
Workaround:
None
939933-8 : Monpd restarts every few seconds due to missing of AVR database
Links to More Info: BT939933
Component: Application Visibility and Reporting
Symptoms:
Monpd reports that it is constantly restarting. A message similar to the following will appear at the console:
logger[2849]: Re-starting monpd
Conditions:
- There is a provisioned module that requires monpd
- Another module is de-provisioned which wipes the mysql database.
- May occur after an upgrade.
Impact:
Modules that rely on monpd will not be fully functioning.
Workaround:
Clearing AVR database will remove all existing statistics data.
1. Stop monpd: bigstart stop monpd
2. Clean data base: touch /var/avr/init_avrdb
3. Clean the statistics file are waiting to be loaded:
cd /var/avr/loader
rm -rf *
4. Start monpd: bigstart start monpd
937665-3 : Relaystate in SLO request results in two Relaystates in SLO Response
Links to More Info: BT937665
Component: Access Policy Manager
Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.
Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate
Impact:
SLO processing on SP may not work.
Workaround:
None.
935769-8 : Upgrading / Rebooting BIG-IP with huge address-list configuration takes a long time★
Links to More Info: BT935769
Component: Advanced Firewall Manager
Symptoms:
Version upgrade takes more time than usual when the config contains address-lists with a lot of IP addresses. The same delay will be observed with 'tmsh load sys config' as well.
Conditions:
-- Configure address-list with 10K to 20K IP addresses or address ranges or subnets.
-- Configuration loading (e.g. Post upgrade, running tmsh load sys config, modification of the configuration and subsequent full load as in full config sync)
Impact:
Version upgrade / 'tmsh load sys config' process takes a long time than usual.
Workaround:
1) Convert continuous individual addresses in the address-lists to IP address ranges and subnets if possible.
2) Remove the huge address-lists from config before the upgrade and add back after the upgrade process is finished.
3) Upgrading to a release or EHF that contains the fix for 1209409. 1209409 does not eliminate the issue but it does reduce the time it takes to validate certain address lists.
932553-9 : An HTTP request is not served when a remote logging server is down
Links to More Info: BT932553
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.
Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.
Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.
Workaround:
None.
932461-9 : Certificate update on the SSL profile server for the HTTPS monitor: BIG-IP does not use the updated certificate.
Links to More Info: BT932461
Component: Local Traffic Manager
Symptoms:
When you overwrite the certificate that is configured on the SSL profile server and is used with the HTTPS monitor, the BIG-IP system neither uses a client certificate nor continues to use the old certificate.
After you update the certificate, the stored certificate is incremented. However, the monitor log indicates that it is using the old certificate.
Conditions:
--Create a pool with an HTTPS pool member.
--Create an HTTPS monitor with a certificate and key.
--Assign the HTTPS monitor to the HTTPS pool.
--Update the certificate through GUI or TMSH.
Impact:
The monitor tries to use the old certificate or does not present a client certificate after the update.
Workaround:
Use one of the following workarounds:
-- Restart bigd:
bigstart restart bigd
-- Modify the server SSL profile certificate key. Set it to ‘none’, and switch back to the original certificate key name.
The bigd utility successfully loads the new certificate file.
923745-6 : Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition
Links to More Info: BT923745
Component: TMOS
Symptoms:
A device reboot occurs when pressing Ctrl-Alt-Del.
Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console.
Impact:
Accidental reboots are possible. You should not reboot VE using Ctrl-Alt-Del.
Workaround:
To disallow the effect of this key chord, run the following command from the advanced shell (bash):
systemctl mask ctrl-alt-del.target
905477-8 : The sdmd daemon cores during config sync when multiple devices configured for iRules LX
Links to More Info: BT905477
Component: Local Traffic Manager
Symptoms:
The iRules LX workspaces belong on only one device in a Device Service Cluster (DSC) (config sync device-group). If you have the same iRules LX workspace configured on multiple devices and then perform a config sync operation, the sdmd daemon cores.
Conditions:
-- Multiple devices configured with the same iRules LX workspace in a DSC.
-- Change one of the devices such that the configuration requires a config sync.
-- Perform the config sync.
Impact:
The sdmd daemon cores. Although having multiple devices configured with the same iRules LX workspace is an incorrect configuration, sdmd should not core.
Workaround:
When the iRules LX workspace is correctly configured, i.e., on only one device in a DSC, there is no need to config sync, so this issues does not occur.
904401-7 : Guestagentd or devmgmtd core
Links to More Info: BT904401
Component: TMOS
Symptoms:
Guestagentd or devmgmtd crashes on a vCMP guest.
Conditions:
This can occur during normal operation in a vCMP environment.
Impact:
Guestagentd crashes on the vCMP guest, and the vCMP host does not have accurate guest information, such as version, provisioning, high availability (HA) status, and tmm status.
Or if it is Devmgmtd that crashed on vCMP guest, the device management daemon will not establishes and maintains device trust group functionality.
Workaround:
None.
902445-5 : ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation
Links to More Info: BT902445
Component: Application Security Manager
Symptoms:
ASM event logging stops working.
Conditions:
This can occur during normal ASM operation. It occurs after ASM executes 'No space in shmem' error disconnection mitigation, and this error is logged.
Impact:
ASM Policy Event Logging stop working; new event is not saved.
Workaround:
Restart asmlogd and pabnagd:
pkill asmlogd
pkill pabnagd
901569-7 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.
Links to More Info: BT901569
Component: Local Traffic Manager
Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.
Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).
Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.
Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.
870349-5 : Continuous restart of ntlmconnpool after the license reinstallation★
Links to More Info: BT870349
Component: Local Traffic Manager
Symptoms:
The ntlmconnpool process continuously restarts after reinstalling the license. The system reports a message in the BIG-IP console:
Re-starting ntlmconnpool.
The BIG-IP may show as 'Disconnected', and 'TMM outbound listener not yet created' messages may be present in /var/log/ltm.
Conditions:
This occurs when you upgrade your license such that the new license changes the number of available TMMs.
Impact:
The system requires a reboot and reports a ‘Re-starting ntlmconnpool’ message continuously in the BIG-IP console.
Workaround:
To resolve the issue, it is necessary to reboot. Once the system restarts, it operates as expected.
783077-4 : IPv6 host defined via static route unreachable after BIG-IP reboot
Links to More Info: BT783077
Component: Local Traffic Manager
Symptoms:
Static route unreachable after BIG-IP system reboot.
Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).
Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.
Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:
tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal
Workaround-2:
net route /Common/IPv6 {
gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
interface /Common/Internal
mtu 1500
network 2a05:d01c:959:8408::b/128
}
777389-8 : In rare occurrences related to PostgreSQL monitor, the mcpd process restarts
Links to More Info: BT777389
Component: TMOS
Symptoms:
Possible indications include the following:
-- Errors such as the following may appear in ltm/log:
- notice postgres[10872]: [466-1] WARNING: pgstat wait timeout.
- notice sod[27693]: 01140041:5: Killing /usr/bin/mcpd pid 7144.
- BD_CONF|ERR| ...failed to connect to mcpd after 5 retries, giving up...
- BD_CONF|ERR| ...can't read message from mcp conn, status:16908291.
- BD_MISC|CRIT| ...Received SIGABRT - terminating.
-- Errors such as the following may appear in the dwbld/log:
- Couldn't send BLOB notification - MCP err 16908291.
- Got a terminate/abort signal - terminating ...
- Terminating mcp_bridge thread.
-- Processes may restart unexpectedly, including mcpd, bd, and postgresql.
Conditions:
-- The 'mcpd' process attempts to read monitoring data from the PostgreSQL server, but no data is available.
-- A contributing factor might be that the AFM module is licensed but not configured.
Impact:
Failing to receive a monitoring response from the SQL server, MCPD goes into an infinite loop and skips the heartbeat report, resulting in its restart. While MCPD is restarting, the system is offline and does not process traffic. After restart, system operation returns to normal.
Workaround:
The chance of occurrence can be minimized by making sure that control-plane processes have sufficient memory to run efficiently.
742764-5 : If two racoon daemon are spawned on startup, one fails and cores.
Links to More Info: BT742764
Component: TMOS
Symptoms:
When a BIG-IP system becomes Active, tmipsecd starts a racoon daemon for each route domain, including the default RD 0.
If for any reason racoon fails to fully start, tmipsecd will start another instance of racoon.
When this occurs, one or both of them may crash and create a core file.
Conditions:
-- BIG-IP becomes Active or racoon is (re)started.
-- IPsec does not have to be configured for this failure to occur.
Impact:
IPsec IKEv1 tunnels might delay starting while racoon restarts.
Workaround:
N/A
739475-9 : Site-Local IPv6 Unicast Addresses support.
Links to More Info: BT739475
Component: Local Traffic Manager
Symptoms:
No reply to Neighbor Advertisement packets.
Conditions:
Using FE80::/10 addresses in network.
Impact:
Cannot use FE80::/10 addressees in network.
Workaround:
None
721591-4 : Java crashes with core during with high load on REST API
Links to More Info: K000141369, BT721591
Component: TMOS
Symptoms:
Java crashes with core.
Conditions:
This is a random crash and there are no known conditions for reproducing it.
Impact:
This crash occurs randomly during normal operation and has following impact:
-- Stats are not available.
Workaround:
-- Restart the Java service with "bigstart restart restjavad" or "tmsh restart sys service restjavad".
-- Restart the BIG-IP system.
718796-9 : iControl REST token issue after upgrade★
Links to More Info: BT718796
Component: Device Management
Symptoms:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST lose the ability to make those calls.
Conditions:
You will notice this issue when you use iControl REST and are upgrading to version 13.1.0.x or later.
You can also detect if the user is impacted by this issue with the following steps
1. Run below API to for impacted user account XYZ.
# curl -ik -u username:XYZ -XPOST https://localhost/mgmt/shared/authn/login --data-binary '{"username":"XYZ", "password":"XYZpass", "loginProviderName":"tmos"}' -H "Content-Type: application/json"
2. Find user XYZ's 'link' path under 'token' in previous output
There are two formats possible for 'link'
a. Path will have a UUID
For example "token"->"link"->"https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>"
b. Path will have a username (not UUID)
For example "token"->"link"->"https://localhost/mgmt/shared/authz/users/<username>"
3. Run below API to get list of user roles.
# restcurl -u "admin:<admin-user-pass>" /shared/authz/roles | tee /var/tmp/rest_shared_authz_roles.json
4. Check user XYZ's link path from step 2 in above output.
Check under the "userReferences" section for group "iControl_REST_API_User" . You will see the link path in one of the two formats listed in 2a/2b. If you do not see the user link path then you are impacted by this bug
Impact:
A previously privileged user can no longer query iControl REST. In addition, some remotely authenticated users may lose access to the Network Map and Analytics view after the upgrade.
Workaround:
You can repair the current users permissions with the following process:
1) Delete the state maintained by IControlRoleMigrationWorker and let it rerun by restarting restjavad process:
# restcurl -X DELETE "shared/storage?key=shared/authz/icontrol-role-migrator"
2) Restart services
# bigstart restart restjavad *or* tmsh restart /sys service restjavad
3) Now, the permissions should start in a healthy state. Re-try making an iControl REST call with an affected user.
4) If this still does not resolve the issue you could update shared/authz/roles/iControl_REST_API_User userReference list to add all affected users' accounts using PUT. Here you may need to use the UUID path as described under 'Conditions'
# restcurl shared/authz/roles/iControl_REST_API_User > role.json
# vim role.json
a. add { "link": "https://localhost/mgmt/shared/authz/users/[your-user-name]" } object to userReferences list
OR
b. add { "link": "https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>" } object to userReferences list
# curl -u admin:admin -X PUT -d@role.json http://localhost/mgmt/shared/authz/roles/iControl_REST_API_User
673060-2 : SSL handshake failure with Session Ticket enabled on the backend server
Links to More Info: BT673060
Component: Local Traffic Manager
Symptoms:
SSL handshake failure occurs as a certificate is not issued (no certificate).
Conditions:
- Server SSL profile is enabled with the Session Ticket feature
- Backend server also supports Session Ticket
Impact:
- Service is disrupted because of a handshake failure.
- SSL handshake fails with no certificate issue.
Workaround:
Disable the Session Ticket feature on the Server SSL Profile or the backend server.
566756-3 : VCMP 4 cores on 3 blades : mcpd core when delete 255 dos profiles via tmsh command while machine is idle
Links to More Info: BT566756
Component: TMOS
Symptoms:
Mcpd crashes.
Conditions:
1.create 4 cores vcmp guest on vic 1+ with 3 blades
This platform has 15GB of mem
2. provision asm + ltm + AVR +FPS
3. create via script 255 dos profiles ( script attached)
4. delete it via tmsh command : delete security dos profile dos_*
5. result : Sometimes MCPD will crash
Impact:
Traffic and control plane disrupted while mcpd restarts.
Workaround:
None
563144-6 : Changing the system's admin user causes many errors in the REST framework.
Links to More Info: BT563144
Component: Device Management
Symptoms:
The iControl REST log at /var/log/icrd will have entries similar to the following:
notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.
Conditions:
Change the default admin user, for example, by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://support.f5.com/csp/article/K15632.
Impact:
Many REST APIs do not function, and functionality that depends on REST fails.
Workaround:
There is no workaround. You must use the default admin in order for iControl REST calls to work.
1970969-1 : Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache
Links to More Info: BT1970969
Component: Global Traffic Manager (DNS)
Symptoms:
Stale Record Answers counter increments incorrectly when no stale record is served and a SERVFAIL is sent.
Conditions:
-- Configure DNS cache resolver with a forwarder.
-- Make sure forwarder does not respond to DNS queries.
-- Enable 'ltm dns cache global-settings serve-expired'
-- Send a few DNS requests to DNS cache for a record which is to be handled by not responding forwarder.
-- Observe 'Stale Record Answers' counter for DNS cache.
Impact:
Leads to incorrect Stale Record Answers stat, potentially misleading monitoring, troubleshooting, and operational decisions.
Workaround:
None
1970193-2 : Case WAF policy IP address exception list on GUI: Missing Route Domain ID in the IP address
Component: Application Security Manager
Symptoms:
WAF policy misses route domain ID in IP exception addresses list on the GUI.
Conditions:
Different WAF policies belonging to different partitions have route domain ID associated with IP addresses.
Impact:
Cosmetic, route domain ID not available in IP address exception list on GUI.
Workaround:
None
1969861-1 : [APM][NTLM]ECA core SIGSEGV
Links to More Info: BT1969861
Component: Access Policy Manager
Symptoms:
ECA cores repeatedly
Conditions:
NTLM Configuration in APM
Impact:
Cannot process NTLM traffic.
Workaround:
None
1968193-1 : Management Route name displayed incorrectly via API when the route name contains a forward slash (/)
Links to More Info: BT1968193
Component: TMOS
Symptoms:
Management route names that include a forward slash (/) are displayed incorrectly when queried through the API, showing only the netmask instead of the full name. However, the route name displays correctly when viewed using tmsh.
Conditions:
- A management route is created with a name that contains a forward slash (/), commonly seen when incorporating the network and subnet mask into the name, such as "10.10.10.0/24". Any other attempt to specify forward slash in the name will return a validation error.
- When queried via API, the name is inaccurately truncated to display only the netmask rather than the full route name.
Impact:
This issue does not affect the operational functionality of the management route. However, administrative challenges may arise due to the API returning an incomplete route name.
Workaround:
To avoid this issue, refrain from using a forward slash (/) in the name when defining a management route.
1968169-2 : [APM][CitrixIntegration]Apps do not launch unless "Accounts" is selected in Citrix Workspace App
Links to More Info: BT1968169
Component: Access Policy Manager
Symptoms:
After entering credentials, the Citrix app does not launch unless clients select the "Account" in the Citrix Workspace App "Settings".
Conditions:
-- APM and Citrix integraton
-- Accessing Citrix Workspace app
-- The client is rebooted or changes networks
Impact:
Citrix apps are not downloading.
Workaround:
Clients that are affected can log out and back in.
You can work around this on the BIG-IP system by applying an iRule which adds the header "X-Citrix-Gateway: <value>" to the server side
when HTTP_REQUEST {
if {[HTTP::header exists "X-Citrix-Gateway"]} {
set origin_header [HTTP::header value "X-Citrix-Gateway"]
} else {
set origin_header ""
}
}
when HTTP_REQUEST_SEND {
if {$origin_header ne ""} {
HTTP::header insert "X-Citrix-Gateway" $origin_header
HTTP::header insert "X-Citrix-Via" $origin_header
}
}
1967589-2 : Using tmsh to query iControl REST (tmsh list mgmt ...) commands consume an auth token and does not get removed immediately
Links to More Info: BT1967589
Component: TMOS
Symptoms:
Executing tmsh commands that interact with the REST configuration module (e.g. "tmsh list mgmt ...") consume a REST token. These tokens are not released automatically by tmsh once the command finishes executing.
Conditions:
Execute command on terminal "tmsh list mgmt shared authz tokens"
Impact:
Once the token limit is exhausted, they will only expire after 20 minutes. If a configured token limit is reached, no users can log in until those tokens expire.
Workaround:
None
1967261-3 : RDP Parameter "enablerdsaadauth" when added to RDP setting causes file to be corrupted
Component: Access Policy Manager
Symptoms:
When RDP parameter "enablerdsaadauth:i:1" is added to RDP custom settings in Remote desktop resource configuration, user is unable to access VDI resources due to signature validation failure on client.
Conditions:
1. APM VDI is configured for MSRDP
2. Custom parameter "enablerdsaadauth:i:1" is added in Remote desktop resource configuration.
Impact:
User is unable to access remote desktop using Microsoft RDP file, through APM.
Workaround:
-NA-
1966941-2 : High CPU or increased translation errors following upgrade or restart when DAG distribution changes
Links to More Info: BT1966941
Component: TMOS
Symptoms:
Dagv2 tables are randomized and may change when a tmm is restarted. This can result in a change of traffic distribution, which in some cases may lead to traffic disruption.
The specific condition when this option was introduced is using a CGNAT pool that is not large enough.
Other ways of encountering include increased translation failed errors following an upgrade or restart or blade replacement.
Conditions:
- tmm is restarted (or chassis rebooted)
Impact:
- dag distribution changes which may cause a traffic disruption.
Workaround:
You can restart tmm until the distribution is good, which can be checked using tools like cmp_dest.
1966589 : Changes to fixup scripts breaks schema upgrade★
Links to More Info: BT1966589
Component: TMOS
Symptoms:
Fixup scripts breaks schema upgrade
Conditions:
Upgrade BIG-IP from one version to another version
Impact:
Configuration fails to load
Workaround:
None
1966053-1 : MCPD memory leak in firewall
Links to More Info: BT1966053
Component: TMOS
Symptoms:
Viewing virtual server firewall policy rules leaks some memory in MCPD.
Conditions:
- BIG-IP AFM is provisioned
- Virtual server firewall policy rules are viewed, e.g. by running one of the following commands
'tmsh show security firewall policy rules { }'
Impact:
A memory leak occurs when the command is run.
Workaround:
None
1965849-1 : [APM] TMM core is observed in validating the saml assertion signature
Links to More Info: BT1965849
Component: Access Policy Manager
Symptoms:
In SAML assertion signature validation, there is an error scenario where a macro in the defined log expects multiple arguments, which have been incorrectly passed.
Conditions:
SAML SP is configured with
- Invalid certificates.
- Or incorrect permission for certificates.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
SAML is configured with proper certificates with proper permissions.
1965497 : Firewall Policy is not effective when the same rule list is attached to two different firewall policies.
Links to More Info: BT1965497
Component: Advanced Firewall Manager
Symptoms:
Two Network Firewall Policies (with the same rulelist) being attached to two different IP forwarding VIPs are behaving differently.
Conditions:
1. Create 2 IP forward virtual
2. Define 1 Rule list on network firewall policy that involves "Zone" config
3. Define 2 network firewall policies and refer the Rule list that created on previous step
4. Configure each network firewall policy on each IP forward virtual
5. Check connectivity from a client. One of the virtual rejects the request.
Impact:
The firewall policy shows varied enforcement behavior on the Virtual Server.
Workaround:
Use different rules in each rule list and add for different firewall policies.
Or
In any one of the Firewall Policy add dummy rule at the end.
Or
Update the configuration on a working Virtual Server.
Ex:
a. Navigate to Local Traffic ›› Virtual Servers : Virtual Server List ›› VS
b. Toggle Network Firewall Enforcement Mode to disabled.
c. Hit update button.
d. Toggle Network Firewall Enforcement Mode back to enabled.
1965329-1 : TMM may crash when re-declaring an LTM policy with a data-group
Links to More Info: BT1965329
Component: Local Traffic Manager
Symptoms:
TMM may crash when re-declaring an LTM policy with a data-group.
Conditions:
-- AS3 declaration that has a VIP with an LTM policy that uses a data-group.
-- The policy is re-declared while there is traffic on the VIP
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Declare while no traffic is on the VIP
Use iRules instead of LTM policies to access the data-group
1965257-1 : upgrade to 17.5.0 results in Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576) error is seen in ltm log
Links to More Info: BT1965257
Component: Access Policy Manager
Symptoms:
error log in /var/log/ltm:
Invalid subscription request from (%localdbmgr) unknown class/struct tag (4576)
Conditions:
BIG-IP's version is 17.5.0 or greater
Impact:
localdbmger may not be able to fetch the correct cluster size specific to products.
1964933-2 : HTTP2 RST flood detection should allow for legitimate case
Links to More Info: BT1964933
Component: Local Traffic Manager
Symptoms:
In some cases, an HTTP2 client might get its TCP connection terminated.
Conditions:
Client is sending RST STREAM with error code CANCEL for example, but it is sent after the server has completed sending its data for the associated stream.
All RST STREAM are subject to RESET stream flood detection.
Impact:
Performance impact.
Workaround:
None
1962813-4 : The csyncd daemon on one or more of the cluster's secondary blades does not synchronise RRD files from the primary★
Links to More Info: BT1962813
Component: Local Traffic Manager
Symptoms:
Following a boot into a different software volume, occasionally csyncd on one or more secondary blades stops syncing most of the RRD files from the primary blade's /var/rrd/ directory to the local /var/rrd/ .
The RRD files are used to generate the graphs in the BIG-IP GUI.
Conditions:
- Cluster running one of the affected versions.
- Boot into a newly installed software volume, or into an already existing but different software volume.
- Primary blade ownership change after the boot.
Impact:
Some of the RRD files stop being synchronised from the primary blade to one or more of the secondary blades.
After a primary blade ownership change, graphing data from the other blades (up to the point when the secondary blade became primary) is unavailable in the GUI and whenever a qkview is generated.
Workaround:
Restart the statsd daemon from the primary blade with:
"bigstart restart statsd".
1962073-1 : Creation of file type entries with trailing and/or leading spaces is allowed via REST in ASM policy
Links to More Info: BT1962073
Component: Application Security Manager
Symptoms:
Duplicate 'File Type' entries seen in ASM policy
Conditions:
'File Type' entries in ASM policy created via REST
Impact:
'File Type' protection do not work as expected
Workaround:
Delete the existing entries and add them via GUI
1959785-2 : BIG-IP incorrectly marked as "Managed by BIG-IQ" by its BIG-IP HA peer
Links to More Info: BT1959785
Component: TMOS
Symptoms:
Managed by BIG-IQ" message on Standby BIG-IP is incorrectly displayed on the standby device that is not managed by BIG-IQ.
Conditions:
Steps to Reproduce:
- On BIG-IQ, navigate to "Devices >> BIG-IP DEVICES", only add the active BIG-IP device.
- The standby device will be marked as "Managed by BIG-IQ" on the top left corner of the GUI.
Expected Results:
When active device only managing by the BIG-IQ, standby device should not by shown as "Managed by BIG-IQ"
Impact:
The "Managed by BIG-IQ" message on Standby BIG-IP is misleading since it has not been added/managed by CM.
Workaround:
None
1959629-1 : CSR generation via the GUI removes Subject Alternative Name (SAN) string. Also, when SAN is configured with small prefix chars "dns:", no error is thrown.
Links to More Info: BT1959629
Component: Local Traffic Manager
Symptoms:
1) The GUI does not throw an error when subject alternative name is set with lower case prefix "dns:".
2) The GUI does not set SAN strings while generating CSR on GUI. (this does not occur on 17.1.2.2)
Conditions:
-- Use the GUI to create a CSR which is to be signed by other CA, setting "Subject Alternative Name (SAN)" strings with prefix "dns:" in lower case instead of "DNS:".
In this case, the CSR is generated but an error should occur.
-- Use the GUI to create a CSR with a SAN string containing the correct prefix with capitalized "DNS:".
In this case, CSR generation finishes with no error. However, looking at generated CSR, the SAN field is omitted.
Impact:
An invalid certificate is created.
Workaround:
Create the CSR via tmsh (tmsh create sys crypto csr) instead of the GUI
1959361 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes
Component: Performance
Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.
Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.
Impact:
DOSL7 (BADOS) is not functioning. Core created.
Workaround:
None
1958033-1 : MCPD validates only one ssl profile when a virtual server attached to http/2 profile with enforce-tls-requirements enabled along with multiple clientssl profiles with anyone has renegotiation option enabled
Links to More Info: BT1958033
Component: TMOS
Symptoms:
Configuration of HTTP/2 profile with enforce-tls-requirements enabled and a client-ssl profile with renegotiation enabled is sometimes allowed, when it should throw an error.
When 'Enforce TLS Requirements' in a HTTP/2 profile is configured on a virtual server, the 'TLS Renegotiation' option needs to be disabled in the SSL profiles on that virtual server.
But in some cases, the configuration is accepted without error even when renegotiation option is enabled on the SSL profile.
Conditions:
-- Virtual server with HTTP/2, HTTP, and client SSL profiles (any one of the profiles has renegotiation enabled).
1. Enable the 'Enforce TLS Requirements' option in the HTTP/2 profile (by default it is enabled).
2. Add multiple client SSL profile with 'TLS Renegotiation' enabled.
3. Save the configuration.
Its not throwing the error.
Impact:
Configuration of http/2 profile with enforce-tls-requirements enabled and client SSL profile with renegotiation enabled and when these profiles are added to the virtual server, a configuration error occurs:
01070734:3: Configuration error: In Virtual Server (/Common/testVS) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/testssl2'; renegotiation must be disabled
Workaround:
None
1957977-2 : Auto-learned DoS Vector attack is detected even with low rate of traffic on HA Pair during Failover★
Links to More Info: BT1957977
Component: Advanced Firewall Manager
Symptoms:
After upgrading BIG-IP AFM from 15.1.8 to 17.1.2, DoS vectors (especially "Non TCP connection") are triggered and start attack detected, even though there is no actual attack or stress (CPU usage is low). The detection threshold is set to 0, causing false positives.
Conditions:
-- Upgrade from 15.1.8 to 17.1.2 (with EHF/instrumented TMM).
-- Device becomes Active after upgrade/failover.
-- AFM Device DoS vectors in Fully Auto mode.
Impact:
Logs show attack detection with thresholds at 0, despite no actual stress or attack. This leads to immediate and incorrect attack detection, causing false alarm even when there is no actual attack or system stress.
Workaround:
None
1957157-1 : [nlad]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
Links to More Info: BT1957157
Component: Access Policy Manager
Symptoms:
You may observe below logs in /var/log/ltm
ltm.1:May 17 17:42:28 sgb006-e-pr-lb01.77robinson.sg.westpac.com.au err nlad[31252]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
ltm.1:May 17 17:42:28 sgb006-e-pr-lb01.77robinson.sg.westpac.com.au err fips_monitor[19162]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action
Conditions:
Conditions are unknown
Impact:
Unexpected reboot causing disruption to traffic and failover.
Workaround:
None
1953369-1 : DB monitor queries repeatedly if recv string configured but response does not match
Links to More Info: BT1953369
Component: Local Traffic Manager
Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may send multiple queries to the database server in quick succession if the monitor is configured with a 'recv' string, but the response from the server does not contain the configured string.
Conditions:
-- A database monitor (mssql, mysql, oracle, postgresql) is configured with a 'recv' string.
-- The query to the database server completes successfully, but the response does not contain the configured 'recv' string.
Impact:
The database monitor correctly marks the configured pool member 'DOWN' as appropriate, but generates unnecessary queries to the database server.
Workaround:
None
1953273-1 : Big3d high CPU with thousands of https monitors with SNI
Links to More Info: BT1953273
Component: Global Traffic Manager (DNS)
Symptoms:
Big3d high CPU utilization occurs
Conditions:
Large volume of https monitors and monitored resources with SNI configured.
Impact:
Big3d high CPU utilization
Workaround:
None
1952881-1 : Tmm memory leak in SCTP metadata
Links to More Info: BT1952881
Component: Service Provider
Symptoms:
Tmm crashes on out of memory.
Conditions:
Virtual server configured with a sctp profile and a legacy diameter profile.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use the recommended message routing framework (MRF) Diameter solution instead of the legacy diameter (MBLB) profile.
1952821-2 : WAF guided configuration shows a warning message instead list of available configurations
Component: Application Security Manager
Symptoms:
A warning message "Your BIG-IP version does not support the selected category of configuration templates. Please upgrade your BIG-IP system to configure them." Instead, the configurations list (categories) is available.
Conditions:
There is a mismatch versions between the Guided Configuration installed and the BIG-IP.
Impact:
The user cannot choose any of the guided configuration categories that otherwise would be available.
Workaround:
Uninstall all iApps packages and return to Guided Configuration, allowing BIG-IP to reinstall the default packages as part of the GC release package. Alternatively, the "Upgrade Guided Configuration" option can be used to upload and install a newer version of GC. Since iApps packages are bundled within a GC release, these methods ensure compatibility and eliminate version mismatch problems.
1952557-1 : DB monitor incorrectly marks pool member UP if recv string configured but no results from DB server
Links to More Info: BT1952557
Component: Local Traffic Manager
Symptoms:
A database monitor (mssql, mysql, oracle, postgresql) may incorrectly mark a pool member as UP if the monitor is configured with a 'recv' string, but the query configured in the 'send' string does not return any results from the database server.
In this case, the DB (database) monitor attempts to match the 'recv' string to the result set from the database server, and fails to mark an empty result set as a mismatch.
Conditions:
-- A DB (database) monitor (mssql, mysql, oracle, postgresql) is configured and applied to an LTM or GTM pool.
-- The DB monitor has a 'send' string configured with a query that does not return any results from the database server.
-- The DB monitor has a 'recv' string configured.
Impact:
Pool members may be incorrectly marked UP.
Workaround:
In the DB monitor configuration, modify the query in the 'send' to return a result that does not match the 'recv' string.
1943669 : "Automatic Update Check & Automatic Phone Home features" settings is changed upon running 'load sys config current-partition' in other partition
Links to More Info: BT1943669
Component: TMOS
Symptoms:
'auto-check' and 'auto-phonehome' configurations are not updated on non-Common partitions.
Conditions:
1. Disable "auto-check" and "auto-phonehome"
2. Save the config
3. Check "auto-check" and "auto-phonehome" status.
4. Switch to non-Common partition.
5. Load the current config
6. Check the "auto-check" and "auto-phonehome"
7. Switch back to common partition and check the status.
Impact:
These features could be enabled if you load the configuration on the non-Common partitions.
Workaround:
Disable 'auto-check' and 'auto-phonehome' again after switching back to the Common partition.
1943593-2 : Inconsistent DoS Attack Status between tmctl/event logs and GUI
Links to More Info: BT1943593
Component: Advanced Firewall Manager
Symptoms:
GUI shows "Not Detected / Forwarded" for PPS even though tmctl reports detection.
Conditions:
PPS rate fluctuates around the threshold, often staying below it.
Impact:
Detection is triggered internally (tmctl), but not reflected in the GUI; this may mislead operators monitoring attacks via the GUI.
Workaround:
None
1943257-1 : HTTP monitor "last error" string sends incorrect response
Links to More Info: BT1943257
Component: Local Traffic Manager
Symptoms:
When a recv string is used with an HTTP/HTTP2 monitor, the HTTP status code is collected and in the event of failure, the most recent value (from before the failure) is retrieved and used as part of the log output. This can result in a message that is misleading.
Conditions:
- The BIG-IP system configured to monitor an HTTP/HTTP2 server.
Impact:
Generates a misleading log messages, difficulty in identifying the actual cause of the monitor failure.
notice mcpd[8371]: 01070638:5: Pool /Common/http-pool member /Common/172.16.1.87:80 monitor status down. [ /Common/my-http-monitor: down; last error: /Common/my-http-monitor: Response Code: 200 (OK) @2025/05/12 07:30:25. ] [ was up for 0hr:0min:46sec ]
Workaround:
None
1943217 : BGP - using 'no bgp default ipv4-unicast' might lead to a crash
Links to More Info: BT1943217
Component: TMOS
Symptoms:
Using 'no bgp default ipv4-unicast' might lead to a crash when saving a configuration.
Conditions:
'no bgp default ipv4-unicast' configured.
Impact:
Bgpd crash/core.
Workaround:
Do not use 'no bgp default ipv4-unicast' configuration statement.
1938345 : F5 on AWS : Unable to Launch F5 BigIP instance with latest firmware 17.5.0 in AWS★
Component: TMOS
Symptoms:
BIG-IP AWS instance using AMI image for 17.5.0 intermittently fails to complete onboarding, specifically for one particular flavour of image - F5 BIGIP-17.5.0-0.0.15 PAYG-Best Plus 1Gbps.
Conditions:
When rapid bigip instance ami is deployed on AWS. Specially F5 BIGIP-17.5.0-0.0.15 PAYG-Best Plus 1Gbps AMI.
Impact:
Intermittently the instance completes deployment but without network configuration such as vlans, self IPs and routes
Workaround:
The issue is resolved on the next DHCP lease update
1938101-1 : Performance issue on specific parameters extractions
Links to More Info: BT1938101
Component: Application Security Manager
Symptoms:
Performance degradation on specific pages
Conditions:
When there are dynamic parameters extractions using HTML
Impact:
Slowdown of the extraction page load time
Workaround:
None
1938085-1 : Performance issue on specific parameters extractions
Links to More Info: BT1938085
Component: Application Security Manager
Symptoms:
Performance degradation on specific pages
Conditions:
When there are dynamic parameters extractions using HTML
Impact:
Slowdown of the extraction page load time
Workaround:
None
1937717-1 : AVR increases the Content-Length header but fails to inject the CSPM script into the payload
Links to More Info: BT1937717
Component: Application Visibility and Reporting
Symptoms:
Under certain conditions, AVR will change the Content-Length header (to account for CSPM script injection) but then will not inject the actual CSPM script onto the HTTP payload
Conditions:
- Option "collect-page-load-time" is enabled in the AVR profile
- Sys db key "avr.cspm.inject.location" is set to a value of "after_head"
Impact:
Client can stall waiting for the remaining payload which never arrives
Workaround:
Do at least one of the following things:
- On the HTTP profile, set option "response-chunking" to "rechunk"
- Set sys db key "avr.cspm.inject.location" to "at_the_end"
- On the AVR profile, disable option "collect-page-load-time"
1937589-1 : LTM v17.5.0 f5-irule.crt is valid only until Jul 2027
Links to More Info: BT1937589
Component: Local Traffic Manager
Symptoms:
The nodejs services using default f5-irule.crt certificate request template gets validity upto jul 2027 and may fail to work after July 2027.
Conditions:
BIG-IP software version 17.5.0 using nodeJS/iRules beyond July 2027 without modifying f5-irule.crt validity period.
Impact:
NodeJS/iRules services using unmodified f5-irule.crt fails to work after July 2027
Workaround:
None
1936469-1 : Multiple Ctrl-Alt-Delete signals in virtual console reboots BIG-IP Virtual Edition
Links to More Info: BT1936469
Component: TMOS
Symptoms:
A device reboot occurs when pressing Ctrl-Alt-Del multiple times in rapid succession.
Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console more than 7 times within 2 seconds.
Impact:
Accidental or unauthorized reboots of the BIG-IP instance are possible.
Workaround:
None
1936233-1 : TMM mismanagement of IPsec connections can slowly leak memory and cause tunnel negotiation to fail
Links to More Info: BT1936233
Component: TMOS
Symptoms:
-- The BIG-IP cannot setup a specific IPsec tunnel.
-- The BIG-IP may eventually run out of memory, or core
Conditions:
-- IPsec IKEv2
-- Tunnel config changes, or tunnel never works from initial setup
Impact:
-- TMM may run out of memory after a very long time
-- TMM may core due to the leaked connections
1935713-2 : TMM crash when handling traffic over vlangroup with autolasthop disabled.
Links to More Info: BT1935713
Component: Local Traffic Manager
Symptoms:
In certain circumstances, TMM may crash when handling traffic over a vlangroup with autolasthop disabled.
Conditions:
- Vlangroup.
- No self-IP addresses configured.
- Autolasthop is disabled.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1935053-3 : Impact of crypto queue limits on SSL handshake reliability
Links to More Info: BT1935053
Component: Local Traffic Manager
Symptoms:
SSL handshake failures triggered by sudden connection spikes and crypto queue saturation
Conditions:
1. Brief surge in SSL connection volume
2. Saturation of the crypto processing queue
Impact:
Degraded service availability due to SSL handshake disruptions
Workaround:
None
1934845-1 : Transparent proxy loses APM session variables in SSL Orchestrator service
Links to More Info: BT1934845
Component: SSL Orchestrator
Symptoms:
Cannot access session variables
Conditions:
SSL Orchestrator Transparent Proxy configuration
Impact:
Unable to access session variables with Transparent Proxy
Workaround:
Attach a dummy swg_transparent
1934457-4 : Cursor in BIG-IP Configuration Utility iRule editor appears in the incorrect position
Links to More Info: BT1934457
Component: TMOS
Symptoms:
The cusrsor is at the incorrect position when using BIG-IP Configuration Utility iRule editor for long lines with unwrapped text.
Conditions:
1. Edge or Chrome on Windows
2. Zoom is set at 100%
3. "Wrap Text", "Show Print Margin", and "Ignore Signature/Checksum" are unchecked
4. For a long line in the editor, the cursor would appear in the wrong position.
Impact:
Editing the iRule becomes inconvenient and prone to errors.
Workaround:
Set the zoom in the browsers at 125%
1934397-2 : SSL Orchestrator l2 inline monitor failure on r2000 or r4000 tenants
Links to More Info: BT1934397
Component: Local Traffic Manager
Symptoms:
SSL Orchestrator l2 inline monitors may not function correctly on r2000 or r4000 tenants.
Conditions:
-- SSL Orchestrator
-- l2 inline monitor
A traffic capture will show packets being egressed out one interface and not arriving at the other.
Impact:
The l2 inline service monitored via these interfaces will be marked down.
Workaround:
The issue is due to the MAC filter that is installed for every interface's MAC address. When the filter also matches a vlan MAC address this issue occurrs.
Compare the output of
tmsh show net interface all-properties
and
tmsh show net vlan
and make sure there is no MAC overlap. If there is, create some "dummy" vlans to move the overlap.
After creating dummy vlans, re-assign the MACs with the following command
tmsh modify ltm global-settings general share-single-mac global
tmsh modify ltm global-settings general share-single-mac unique
1934373-2 : DoS attack is blocking while transparent
Links to More Info: BT1934373
Component: Application Security Manager
Symptoms:
A DoS attack is blocking while configured as transparent.
The blocking is only by resets
Conditions:
A transparent volumetric dosl7 and web acceleration profile are configured on the same virtual
Impact:
Blocking even though the configuration is transparent.
Workaround:
tmsh modify sys db dosl7d.static_uri_protection value disable
1934157-2 : Http2 monitor fails if a pool is used for routing to pool members
Links to More Info: BT1934157
Component: Local Traffic Manager
Symptoms:
Http2 monitoring reports all pool members as down
Conditions:
The TCP connection to the pool members are sent to the gateway instead of the pool members
Impact:
Http2 monitoring not possible
Workaround:
Use tcp monitoring or https if possible and acceptable.
1934073-2 : PEM policy rule incorrectly matching when using a flow condition
Links to More Info: BT1934073
Component: Policy Enforcement Manager
Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.
Conditions:
PEM policy rule is using flow conditions to match IP address and port
Impact:
An incorrect policy rule might be matched
Workaround:
None
1933965-2 : Unable to associate multiple cert/keys of different types to Certificate Key Chain via TMSH
Links to More Info: BT1933965
Component: Local Traffic Manager
Symptoms:
Below error is thrown when assigning RSA cert/key followed by ECDSA cert/key with below command
tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with {
_cert_rsa_0 {
cert /path/_cert_rsa.crt
key /path/_cert_rsa.key
chain none
usage SERVER
}
_cert_ecdsa_0 {
cert /path/_cert_ecdsa.crt
key /path/_cert_ecdsa.key
chain none
usage SERVER
}
}
Error:
010717e1:3: Client SSL profile (/path/_ssl_server): cannot contain more than one set of same certificate/key type.
Conditions:
Assigning RSA cert/key followed by ECDSA cert/key
Impact:
Unable to create the client SSL profile
Workaround:
Workaround 1: change the certificate chain order so the ECDSA cert/key occurs before the RSA cert/key.
tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with \{ _cert_ecdsa_0 \{ cert /path/_cert_ecdsa.crt key /path/_cert_ecdsa.key chain none usage SERVER \} _cert_rsa_0 \{ cert /path/_cert_rsa.crt key /path/_cert_rsa.key chain none usage SERVER \} \}
tmsh list ltm profile client-ssl /path/_ssl_server
ltm profile client-ssl /path/_ssl_server {
app-service none
cert-key-chain {
_cert_ecdsa_0 {
cert /path/_cert_ecdsa.crt
key /path/_cert_ecdsa.key
}
_cert_rsa_0 {
cert /path/_cert_rsa.crt
key /path/_cert_rsa.key
}
}
inherit-ca-certkeychain true
inherit-certkeychain false
}
Workaround #2: Create a Client SSL and associate only 1 RSA cert/key. Thereafter, associate the next set of ECDSA cert/key to the same Client SSL profile.
1) Create SSL profile and associate only the RSA cert/key to Certificate Key Chain.
# tmsh create ltm profile client-ssl /path/_ssl_server cert-key-chain replace-all-with \{ _cert_rsa_0 \{ cert /path/_cert_rsa.crt key /path/_cert_rsa.key chain none usage SERVER \} \}
2) Associate existing ECDSA cert/key to Certificate Key Chain of the above SSL Profile
#tmsh modify ltm profile client-ssl /path/_ssl_server cert-key-chain add {_cert_ecdsa_0 { cert /path/_cert_ecdsa.crt key /path/_cert_ecdsa.key chain none usage SERVER }}
tmsh list ltm profile client-ssl /path/_ssl_server
ltm profile client-ssl /path/_ssl_server {
app-service none
cert-key-chain {
_cert_ecdsa_0 {
cert /path/_cert_ecdsa.crt
key /path/_cert_ecdsa.key
}
_cert_rsa_0 {
cert /path/_cert_rsa.crt
key /path/_cert_rsa.key
}
}
inherit-ca-certkeychain true
inherit-certkeychain false
}
1933105-3 : TMM does not fragment the output before encapsulating the payload
Links to More Info: BT1933105
Component: TMOS
Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation
Conditions:
- IPSec
-- Tmm receives fragmented payload
Impact:
Large packets are not fragmented on egress.
Workaround:
None
1933061-1 : Changing "bot category" of an user-defined bot-signature should be validated and denied when the change is not appropriate
Links to More Info: BT1933061
Component: Application Security Manager
Symptoms:
Disallowed configuration gets accepted. Subsequent full configuration load fail and unit remains offline.
Conditions:
A user-defined bot is configured under bot-signature
AND the bot is configured for mitigation exception
Then, bot category of the bot gets updated and new category is one of the categories that is under Unknown/Browser/Mobile Application class
After above operation are performed, subsequent config full load fails.
Impact:
Configuration load fail and unit remains offline.
Workaround:
- Do not perform the operation described in Conditions section
- If it has been performed but your unit is still online, use GUI or TMSH to revert the change of bot category
- If it has been performed and config load has failed and unit is offline state, manually revert the change of bot category as below
e.g:
MyBot was configured in mitigation exception. Bot category of MyBot was updated to be "Mobile App without SDK" that should not be accepted, but accepted due to this bug.
Manually modify /config/bigip.conf
// Before manual modification
security bot-defense signature /Common/MyBot {
category "/Common/Mobile App without SDK"
risk na
user-agent {
search-string MyBot
}
}
// After manual modification
security bot-defense signature /Common/MyBot {
category "/Common/Search Bot"
risk na
user-agent {
search-string MyBot
}
}
Save the change then
# bigstart restart
If this does not reflect the manual modification, perform force mcpd reload.
# rm -f /var/db/mcpdb.* ; touch /service/mcpd/forceload
# bigstart restart
1932965-1 : AVRD may crash at startup due to non-thread-safe version of BOOST json Spirit parser
Links to More Info: BT1932965
Component: Application Visibility and Reporting
Symptoms:
Avrd crashes while processing JSON
Conditions:
AVRD utilizes the BOOST Spirit-based JSON parser to parse JSON documents
Impact:
AVRD might crash impacting application performance and traffic analytics may stop being collected or processed while avrd restarts.
Workaround:
None
1932161-3 : PEM iRule usage memory leak
Links to More Info: BT1932161
Component: Policy Enforcement Manager
Symptoms:
When using PEM iRules there is a chance of a memory leak
Conditions:
Using PEM iRules
Impact:
TMM memory leak
Workaround:
None
1930897-1 : Tmm core due to overflow of ifc ref counts with flow forwarding
Links to More Info: BT1930897
Component: Local Traffic Manager
Symptoms:
Tmm crashes when passing high amounts of traffic.
Conditions:
Flow forwarding rejected when accepting flows due to high volume of packets that exhausts connection limit and overflows the ifc ref count.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1930841-1 : Tmsh show sys conn virtual-server may report an incomplete set of flows after a virtual server modification
Links to More Info: BT1930841
Component: Local Traffic Manager
Symptoms:
After modifying a virtual server, 'tmsh show sys connection virtual <virtual-server-name>' may not report connections already existing when the change occurred.
Conditions:
Use the command "tmsh show sys connection virtual <virtual-server-name>".
Impact:
The complete set of connections for the virtual server may not be reported.
Workaround:
Use 'tmsh show sys connection cs-server-addr' (or other selection criteria) instead.
1929045-3 : TMM may core after HTTP::respond used for first request on iSession connection
Links to More Info: BT1929045
Component: Local Traffic Manager
Symptoms:
TMM crashes while establishing an iSession tunnel.
Conditions:
- APM configured
- Tunnel being established
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1928749-2 : TMM cores in rare circumstances
Links to More Info: BT1928749
Component: TMOS
Symptoms:
TMM cores in rare circumstances
Conditions:
Can occur after High Availability (HA) failover.
Impact:
High Availability failover will occur if tmm restarts. If no High Availability (HA) is configured then a temporary outage in the data plane will occur.
1928169-1 : HTTP2 RST_STREAM NO_ERROR received by BIG-IP not interpreted correctly
Links to More Info: BT1928169
Component: Local Traffic Manager
Symptoms:
Communication disrupted to the client when server sends a RST_STREAM NO ERROR
Conditions:
if the server has already sent a response (e.g., headers and body) and does not need additional data from the client (e.g., request body for POST or PUT requests), it might send a RST_STREAM with NO_ERROR to stop the stream and signal that no further data is required.
Impact:
Communication disrupted.
Workaround:
None
1928157-1 : [APM][SAML] constant SIGSEGV "in saml_sp_finish_message_signing" after upgrade to 17.1.x★
Links to More Info: BT1928157
Component: Access Policy Manager
Symptoms:
After upgrade, tmm crashes while passing SAML traffic.
Conditions:
-- SAML profile configured.
-- The profile doesn't have a signed certificate configured for the SP profile
-- The IDP profile does have a signed certificate
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Add the signed certificate to the same profile
1927829-1 : SSL Orchestrator resets connection with connector abort waiting for data from an inline service
Links to More Info: BT1927829
Component: SSL Orchestrator
Symptoms:
Traffic flowing through topologies gets reset (RST) instead of waiting for data to flow from inline services.
Conditions:
A topology is configured to make use of at least one inline service.
Impact:
Connections get reset (RST) and the client does not get data.
Workaround:
None
1927521-1 : DPDK has dependency on SSSE3
Links to More Info: BT1927521
Component: TMOS
Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available
notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------
Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.
[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #
1927225-2 : Vertical tab (u000b) is removed by the JSON parser from the request
Links to More Info: BT1927225
Component: Application Security Manager
Symptoms:
The JSON parser removes the vertical tab (\u00b) from the request, preventing attack signatures from matching and causing the request to be bypassed, despite a possible SQL injection attack.
Conditions:
Attaching the JSON profile, send a request with a vertical tab (\u000b).
Impact:
Attack signatures are not matched, due to which the SQL injection attack is bypassed.
Workaround:
None
1927165 : Fix rare race condition that could cause crash during TMM startup
Links to More Info: BT1927165
Component: TMOS
Symptoms:
TMM crashes during TMM startup
Conditions:
-- Virtual Edition in Azure
-- TMM starting up
Impact:
TMM occasionally fails during startup, increasing amount of time before BIG-IP becomes Active.
Workaround:
None
1926733-1 : Tmm memory leak with L7 response policy
Links to More Info: BT1926733
Component: Local Traffic Manager
Symptoms:
TMM slowly leaks memory.
During diagnosis, with the following diagnostic command:
tmctl -w192 -id blade memory_usage_stat | egrep "http_data|cur_"
http_data indicates the highest memory usage
Conditions:
-- Virtual Server with fastL4 + HTTP
-- L7 response policy attached (for example redirect-http-https)
Impact:
Http_data usage goes up over time and does not return to prior levels when traffic ceases.
Workaround:
None
1922617-3 : BGP Multipath selection might be unpredictable.
Links to More Info: BT1922617
Component: TMOS
Symptoms:
BGP Multipath selection might be unpredictable.
Conditions:
Four EBGP neighbors in two different AS, each sending the same route (NRLI) towards BIG-IP. Route might sometimes not be considered candidate for multipath.
Impact:
Route might not be considered candidate for multipath.
Workaround:
Set 'bgp bestpath as-path multipath-relax' to install all available paths.
1921085-1 : Core file generated when using FTP::ftps_mode require without SSL profile in TCP filter
Links to More Info: BT1921085
Component: Local Traffic Manager
Symptoms:
Tmm crashes while passing ftp traffic.
Conditions:
1. create a FTP virtual without SSL profile.
2. create a iRule to force FTP::ftps_mode require in FTP profile like
when CLIENT_ACCEPTED {
FTP::ftps_mode require
}
3. Attempt FTP transfer via FTP virtual created.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Attach appropriate SSL profile to the FTP virtual.
1921069-2 : The error ERR_ARG occurs when using iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA
Links to More Info: BT1921069
Component: Local Traffic Manager
Symptoms:
The iRule HTTP::collect command without the parameter value in HTTP_REQUEST_DATA returns an error.
Conditions:
The error occurs when the HTTP::collect does not have any value.
Impact:
The iRule fails with ERR_ARG error.
Workaround:
Always enter value to HTTP::collect. Refer HTTP::collect iRule command page, https://clouddocs.f5.com/api/irules/HTTP__collect.html.
This workaround will depend on the specific iRule being used.
1921049-1 : When L7 policy is updated, existing HTTP/2 connection using it gets a RST_STREAM
Links to More Info: BT1921049
Component: Local Traffic Manager
Symptoms:
HTTP/2 connections sometimes get a RST_STREAM
Conditions:
L7 policy that is being used by HTTP/2 connections is updated or changed.
Impact:
Lost of connectivity on a HTTP/2 stream.
Workaround:
Avoid updating L7 Policy while Http/2 connections are active.
1921025-1 : Need more information when http2 RST STREAM
Links to More Info: BT1921025
Component: Local Traffic Manager
Symptoms:
Sometimes, finding the root cause of an http2 RST STREAM is more difficult
Conditions:
Troubleshooting issues with HTTP2
Impact:
Difficulty in debugging.
Workaround:
None
1917677-4 : "show security ip-intelligence info address" may fail to query legacy IP Reputation database
Links to More Info: BT1917677
Component: Advanced Firewall Manager
Symptoms:
When using the command "show security ip-intelligence info address", Query Legacy IP Reputation Database may not get queried.
Explicit documentation outlining how to configure a policy to enable IP reputation database queries in association with this command is missing.
Conditions:
- System provisioned with either ASM or AFM.
- IP Intelligence license activated.
- An IP Intelligence policy configured in the system.
Impact:
The command does not work with the database as intended.
Although the output of the command shows legacy in the IP Intelligence Sources, it does not return the lookup results of the IP reputation database.
Workaround:
None
1900621-2 : Missing client ip
Links to More Info: BT1900621
Component: Application Security Manager
Symptoms:
Client ip address not available for some dosl7 attack ids
Conditions:
Remote logging configured
Impact:
Source ip missing for some attack ids on remote server/dos dashboard
Workaround:
Check attack info in lcoal log_db which contains client ip in on another event
1893989-1 : NTP truncates symmetric keys to 30 bytes
Links to More Info: BT1893989
Component: TMOS
Symptoms:
The Network Time Protocol (NTP) server, where symmetric keys were used for cryptographic operations, was truncated to 30 bytes. This limitation restricted the effective length of symmetric keys even when longer keys were provided. As a result, it reduced the expected level of security for configurations utilizing keys longer than 30 bytes. (For example, using SHA256 symmetric keys will fail)
Conditions:
When NTP uses a symmetric key size of 30 bytes or more.
Impact:
- Truncating symmetric keys to 30 bytes in NTP significantly reduces security by limiting entropy, diminishing compliance with cryptographic standards, and opening systems to a range of attack vectors.
- The truncation silently weakens configurations, affecting user trust and operational reliability.
Workaround:
None
1890997-1 : TCP connection stall in TMM conn table with ASM policy and no websocket profile
Links to More Info: BT1890997
Component: Application Security Manager
Symptoms:
Virtual server configured with and ASM policy but no websocket profile. After a 101 response and the TCP 4-way teardown, the connection isn't removed from TMM connection table.
Conditions:
Virtual server with ASM policy, no websocket profile
Impact:
Connection is not removed from the TMM connection table
Workaround:
Add a websocket profile to the virtual server configuration.
1890749-2 : In a multi-user scenario, the system is allowing users to create more authentication tokens than the maximum limit allowed per user.
Links to More Info: BT1890749
Component: TMOS
Symptoms:
In a multi-user scenario, users are able to create more tokens than the max allowed setting allows.
Conditions:
-- User1 creates 100 tokens
-- User2 creates 100 tokens
-- restart restjavad process
-- User1 try to create new token
-- User1 can create new token without an error
Impact:
No limitation for using tokens.
Workaround:
None
1889861-3 : Passive monitoring with ASM might not log the server response.
Links to More Info: BT1889861
Component: Local Traffic Manager
Symptoms:
Passive monitoring with ASM might not log the server response.
Conditions:
Passive monitoring with ASM deployed. Similar to https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-asm-implementations-14-1-0/working-with-passive-monitoring.html
Impact:
Server response is not getting logged.
Workaround:
None
1889741-2 : Need for the SYS DB variable to toggle ssl_crypto::queue_max
Links to More Info: BT1889741
Component: Local Traffic Manager
Symptoms:
While ssl_crypto::queue_max can be configured using TCL commands, a corresponding TMSH equivalent is required.
Conditions:
When the system handles a large number of concurrent SSL handshakes or cryptographic operations
Impact:
-- SSL handshake failures
-- Inability to configure the ssl_crypto::queue_max via tmsh
Workaround:
None
1881569-4 : Programs invoked by tmsh when session is interrupted may remain running
Links to More Info: BT1881569
Component: TMOS
Symptoms:
If an interactive user session is interrupted while a tmsh process is executing another command (e.g. bash), under particular circumstances the child process may continue executing.
This occurs if the bash process is itself executing a long-running command (e.g. 'watch' or 'tcpdump' or similar), and then the SSH connection is interrupted.
Conditions:
-- An interactive tmsh process runs another program (e.g. bash)
-- That bash process is executing another command that will not generally exit on its own without user intervention (e.g. 'watch' or 'tcpdump')
-- The user session is interrupted
Impact:
Processes remain executing even after they should have been terminated because the user session disconnected.
If the long-running command the bash process is executing tries to invoke tmsh, the LTM log file may contain repeated logs similar to the following:
Mar 25 12:10:00 hostname notice tmsh[22420]: 01420003:5: Cannot load user credentials for user "username"
Mar 25 12:10:00 hostname notice tmsh[22420]: 01420003:5: The current session has been terminated.
Workaround:
Avoid unclean shutdown/interruption of user sessions if possible. Otherwise, identify the long-running processes that are still running, and then kill them.
1881537-1 : Platform Agent does not log diff of Feature Info Attributes
Links to More Info: BT1881537
Component: F5OS Messaging Agent
Symptoms:
Whenever a change is made in F5OS, platform agent dumps the complete list of feature info attributes. Update the platform agent log to show the attribute changes to highlight relevant changes to ease debugging.
Conditions:
- F5OS change on hypervisor such as trunk change.
- Platform agent outputs feature info attributes list.
Impact:
Log messages could be more clear to ease debugging.
Workaround:
None
1881509-1 : Platform Agent not logging Trunk changes from F5OS
Links to More Info: BT1881509
Component: F5OS Messaging Agent
Symptoms:
When trunk changes are made in F5OS, they are not explicitly logged on the tenant.
Conditions:
F5OS tenant making a trunk change.
Impact:
Hard to debug trunk changes made live on F5OS.
Workaround:
None
1880441-2 : Security log profile IPI options are visible for configuration in UI but not allowed
Links to More Info: BT1880441
Component: Advanced Firewall Manager
Symptoms:
In the AFM UI (Security ›› Event Logs : Logging Profiles ›› Edit Logging Profile), the user can edit IPI section and enable the following checkboxes:
Log Shun Events Enabled
Log Geo Events Enabled
Log RTBH Events Enabled
Log Scrubber Events Enabled
However, enabling any of them may result in an error: « The <OPTION NAME> option can only be enabled on the global-network log profile.»
Conditions:
Using the AFM UI to enable the logging profile for IPI options
Impact:
The IPI logging options are not configurable in the UI
Workaround:
None
1856513-2 : Tomcat fails to write log messages to /usr/share/tomcat/logs/liveupdate.log
Links to More Info: BT1856513
Component: Application Security Manager
Symptoms:
You only see this message in /var/log/tomcat/liveupdate.log file. No other log messages are written, which impedes troubleshooting Live Update.
liveupdate.script file is corrupted, live update repository initialized with default schema
Conditions:
You are running on a version which has a fix for ID 907025.
For more information see https://cdn.f5.com/product/bugtracker/ID907025.html
Impact:
Difficult to troubleshoot issues that occur with Live Update
Tomcat memory growth can cause tomcat to run out of memory, be slow, and use higher than usual CPU due to increased garbage collection activity.
Workaround:
Run the following commands:
chown tomcat:tomcat /var/log/tomcat/liveupdate.log
/usr/share/tomcat/logs/liveupdate.log
bigstart restart tomcat
1856449-1 : [keymgmtd]OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
Links to More Info: BT1856449
Component: TMOS
Symptoms:
You may observe below logs in /var/log/ltm
err keymgmtd[31381]: OpenSSL: DRBG Continuous RNG test failed: DRBG stuck.
err fips_monitor[18007]: 01da0011:3: SelfTest/Integrity test failure detected, triggering reboot action
Conditions:
Conditions are unknown
Impact:
Unexpected reboot causing disruption to traffic and failover.
Workaround:
None
1856425-1 : Old EPSEC images keeps coming back on standby device after reboot
Links to More Info: BT1856425
Component: Access Policy Manager
Symptoms:
Previous EPSEC packages still reside on the system /shared/apm/images/ even if they are deleted.
Conditions:
Even both standby and active are sync old epsec images are not being deleted from /shared/apm/images/
-- VIPRION system
-- High availability (HA) environment
-- vCMP with multiple blades
-- The system is rebooted
Impact:
Unnecessary retention of outdated EPSEC images.
Workaround:
1) Look for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
2) Delete older non-used epsec images (using UI or tmsh)
3) Verify no references to older epsec exist in bigip.conf. If they do, they need to be removed.
grep epsec /config/bigip.conf
4) Delete any orphan non-used epsec images from /config/filestore/files_d/Common_d/epsec_package_d/ (only keep the one listed in bigip.conf):
Ex:
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1622.0.iso_126649_1
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1505.0.iso_126643_1
5) Look again for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
6) If some older epsec files are still visible in /shared/apm/images/
6.1) Stop csyncd (this will prevent rsync from restoring epsec images while you try to delete them):
clsh bigstart stop csyncd
6.2) Delete leftover epsec (those not visible in UI):
Ex:
clsh rm -f /shared/apm/images/epsec-1.0.0-1622.0.iso
clsh rm -f /shared/apm/images/epsec-1.0.0-1505.0.iso
...
6.3) Start csyncd:
clsh bigstart start csyncd
6) Sync to standby (if manual sync)
Once completed, move on to standby.
#############
# On standby:
#############
1) Look for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
2) Stop csyncd (that will prevent rsync from restoring epsec images while you try to delete them):
clsh bigstart stop csyncd
3) Delete leftover epsec (those not visible in UI):
Ex:
clsh rm -f /shared/apm/images/epsec-1.0.0-1622.0.iso
clsh rm -f /shared/apm/images/epsec-1.0.0-1505.0.iso
...
4) Verify no references to older epsec exist in bigip.conf. If any, we need to do a full sync from active to standby again.
grep epsec /config/bigip.conf
=> you should see the same thing as the active
5) Delete any orphan non-used epsec images from /config/filestore/files_d/Common_d/epsec_package_d/ (only keep the one listed in bigip.conf):
Ex:
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1622.0.iso_126649_1
clsh rm -f /config/filestore/files_d/Common_d/epsec_package_d/\:Common\:EPSEC\:Upload\:epsec-1.0.0-1505.0.iso_126643_1
...
6) Start csyncd:
clsh bigstart start csyncd
7) Look again for all epsec files on all blades:
clsh find / -path /proc -prune -o -name *epsec-1* -print
8) If you need to confirm that older epsec images are not coming back, reboot the standby guest chassis
1854461-2 : Unable to delete file from "Available to Deploy" when removed from "Available to Install"
Links to More Info: BT1854461
Component: Protocol Inspection
Symptoms:
When deleting an IPS policy, the GUI reports an error "Unable to delete file", but the file is deleted.
Conditions:
After deleting the IM package from the "Available to install", followed by saving the save sys config and reboot the BIG-IP device. Unable to delete the IM package from the "available to deploy" and which leads to the GUI error
Impact:
No functionality impact, only the GUI error, which is cosmetic.
Workaround:
None
1854353-3 : Users with Resource admin role are not able to save the UCS.
Links to More Info: BT1854353
Component: TMOS
Symptoms:
When creating a UCS file, an error occurs:
Data Input Error: Invalid partition ID request, partition does not exist ([All])
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
-- Creating a UCS file
-- The user role that initiated the UCS save is Resource Admin
Impact:
Users in a Resource Admin role are unable to save a UCS file.
Workaround:
Other admin type roles are able to save the UCS file.
1854137-1 : Verified accept and pool reselect-tries may cause TCP proxy to core
Links to More Info: BT1854137
Component: Local Traffic Manager
Symptoms:
Tmm crashes and restarts
Conditions:
-- TCP Virtual server with verified-accept enabled
-- Some form of asynchronous persistance
-- Flaky pool members at precisely the right time in the verified accept sequence.
-- Delayed ACK on serverside, thus allowing the pool member to be taken down and the sweeper to expire the server-side flow.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1853721-3 : User has reached maximum active login tokens
Links to More Info: BT1853721
Component: TMOS
Symptoms:
You are unable to create any new tokens for a user.
Conditions:
To reproduce the issue, create 100 active tokens for non admin user and reboot device
-- 100 active tokens already exist for a non-admin user
-- The system is rebooted
Impact:
You are unable to create any new tokens for the user.
An error is reported: "User has reached maximum active login tokens"
Workaround:
Execute below command
restcurl -X DELETE /shared/authz/tokens
1849829-2 : Deprecation of dnssec-lookaside and dnssec-enable Directives in latest BIND release
Links to More Info: BT1849829
Component: SSL Orchestrator
Symptoms:
The directives dnssec-lookaside and dnssec-enable previously used in the named.conf configuration file are now deprecated and no longer supported by latest BIND versions.
If these directives are present in the named.conf file:
Error messages appear in DNS server logs when starting the named service.
The DNS server fails to start or exhibit unexpected behaviour due to the presence of unsupported directives.
Conditions:
1. SSL Orchestrator L3 explicit topology
2. Check bind version with below command
# named -v
BIND 9.18.28 (Extended Support Version) <id:f77fadb>
This version of BIND is not supporting mentioned dns tokens.
Impact:
DNS queries will fail if the BIND configuration (named.conf) contains unsupported directives (e.g., dnssec-lookaside, dnssec-enable).
As a result:
The DNS resolver will fail to process queries.
This will cause traffic relying on name resolution to fail, leading to potential disruptions in services that depend on DNS.
Workaround:
1. Remove the deprecated directives dnssec-lookaside and dnssec-enable from the BIND configuration file located at: /var/named/config/named.conf
2. After making the changes, restart the named service to apply the updated configuration: bigstart restart named
1849585-2 : A correctly encoded long Authorization param triggers 'illegal base64 value' vaiolation
Links to More Info: BT1849585
Component: Application Security Manager
Symptoms:
A correctly encoded base64 string that is over 8192 triggers 'illegal base64 value' violation
Conditions:
Authorization param is longer than 8192 chars
Impact:
False positive with 'illegal base64 value'
Workaround:
Disable the violation
1849265-4 : A VCMP guest may not exit hardware syncookie mode
Links to More Info: BT1849265
Component: TMOS
Symptoms:
On a VCMP guest, if a virtual server enters hardware syncookie mode due to a syn flood, and the vip is passing a significant amount of valid traffic, it may not exit syncooke mode.
Conditions:
VCMP guest
Hardware syncookie mode
Impact:
Syncookies may continue to be issued even though the attack has stopped.
Workaround:
Remove traffic from the virtual server until syncookies deactivates.
1849029 : Debug TMM crashes in FIPS/CC mode
Links to More Info: BT1849029
Component: Local Traffic Manager
Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.
Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Switch to non debug tmm.
1848577-2 : VCMP guest stats are not visible on vCMP host GUI nor CLI
Links to More Info: BT1848577
Component: Application Visibility and Reporting
Symptoms:
- Issuing the command 'tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }' returns 'No data available'
- Graphs on 'Statistics ›› Analytics : vCMP : CPU Usage' says "There is no data to display either due to the lack of relevant traffic or due to the settings of the filter." even after the vCMP guest has been running for more than 10 minutes.
Conditions:
- vCMP host running v17.1.x
- The following tables are missing when issuing the command tmctl -f /var/tmstat/blade/vcmp_union_tables' from the vCMP host:
vcmp_tmm_stat_union
vcmp_pva_stat_union
vcmp_proc_pid_stat_union
vcmp_host_info_stat_union
Impact:
No stats (eg. CPU, Network, Disk Usage) can be seen for the vCMP guests when looking from the vCMP host.
Workaround:
Run this Bash one-liner from the vCMP host:
bigstart restart merged ; sleep 600 ; bigstart restart avrd ; sleep 600 ; bigstart restart avrd merged ; sleep 600 ;
Thereafter, check the tables and analytics with these commands:
tmctl -w$COLUMNS -f /var/tmstat/blade/vcmp_union_tables
tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }
1848565-2 : Error during updating device details: Internal error (Json parser error)
Links to More Info: BT1848565
Component: Access Policy Manager
Symptoms:
Mdmsyncmanager reports errors for every query from the MDM DB:
Error in /var/log/apm:
notice mdmsyncmgr[24645]: 019dffff:5: (null)::00000000: {} /Common/mdm: Start querying devices from https://mysite.com/TrafficGateway/TrafficRoutingService/ResourceAccess/ComplianceRetrievalService
err mdmsyncmgr[24645]: 019dffff:3: (null)::00000000: {} /Common/mdm: Error during updating device details: Internal error (Json parser error)
Conditions:
MDM is configured.
Impact:
Errors are logged by mdmsyncmanager due to JSON errors. Other causes or impacts are unknown, this does not seem to impact traffic.
Workaround:
None
1828005-1 : Syslog message does not carry log level when destination is remote
Links to More Info: BT1828005
Component: TMOS
Symptoms:
When a syslog include filter includes a local log source, the log level filter is ignored for the remote syslog server.
Conditions:
Add an include filter with source,filter,destination and configure source as local:
include "
filter f_remote_loghost {
facility(local0) and level(info..emerg);
};
destination d_remote_loghost {
udp(\"<ip>\" port(514));
};
log {
source(local);
filter(f_remote_loghost);
destination(d_remote_loghost);
};
"
Impact:
Log level is not displayed. This makes it difficult to understand the priority of the logs on the remote system.
Workaround:
Include s_syslog_pipe as source in the include filter
Steps to apply:
1. Login to tmsh and execute the command to edit the config : tmsh edit /sys syslog all-properties
2.Add the below include config:
include "
filter f_remote_loghost {
facility(local0) and level(info..emerg);
};
destination d_remote_loghost {
udp(\"<ip>\" port(514) );
};
log {
source(s_syslog_pipe);
filter(f_remote_loghost );
destination(d_remote_loghost);
};
"
3.Save the file and restart syslog with the command: bigstart restart syslog-ng
4. This will reflect the logs with priority in the remote server
1826273-2 : Mysql client uses TLS1.1 when connecting to mysql server running 5.7
Links to More Info: BT1826273
Component: TMOS
Symptoms:
Connection is always negotiated with TLS1.1
Conditions:
The mqsql client in BIG-IP's version is 5.1.47, which hardcode's the TLS version used to connect with mysql server versions which supports TLS1.1. TLS1.1 is not a supported version in mysql server 8.0.0.4 onwards and client successfully connects to those servers with TLS 1.2.
Impact:
Client should negotiate with TLS1.2
Workaround:
None
1826013-1 : BIG-IP as Oauth C/RS "Invalid json error" after upgrade to 17.1.2.1 when json response has non ASCII characters★
Links to More Info: K000150397, BT1826013
Component: Access Policy Manager
Symptoms:
OAuth authentication fails with error error: Invalid json on oauth client/RS
Conditions:
OAuth client/RS receives JWT token which contains non-ASCII characters
Impact:
OAuth authentication fails
Workaround:
None
1825357-2 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk
Links to More Info: BT1825357
Component: Local Traffic Manager
Symptoms:
Tmm crashes and generates a core file.
or
Network traffic via a trunk does not work.
Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC
All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.
or
A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.
Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk
Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.
Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.
1825253-1 : Enhance the log message for better readability User session was terminated due to IP address change during session
Links to More Info: BT1825253
Component: Access Policy Manager
Symptoms:
Users experience an unexpected termination of their session when the IP address changes during the active session. So the log message was improved for better readability.
Conditions:
This issue is observed when there is a network change, such as:
-- Switching from WIFI to mobile data.
-- VPN IP address change.
-- IP address reassignment due to DHCP lease renewal.
Impact:
Users are abruptly logged out, resulting in lost session data or work in progress. This can cause delays and interruptions in workflows, especially in environments that require continuous access.
Workaround:
None
1824985-3 : In rare cases the Nitrox hardware compression queue may stop servicing requests.
Links to More Info: BT1824985
Component: Local Traffic Manager
Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.
When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.
Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.
Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.
Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.
1824521-2 : GUI: VLAN names are not populated while creating the vlan-group under Network Quick configuration
Links to More Info: BT1824521
Component: Local Traffic Manager
Symptoms:
VLAN names are not present as a dropdown option in the Quick configuration GUI.
Conditions:
On a tenant device, navigate to Network -> Quick Configuration -> Create -> VLAN Group Properties -> Tag
Impact:
We may be unable to configure the vlangroup from the Quick configuration GUI on the tenant
Workaround:
VLAN groups can be configured through the following path:
Network > VLANs > VLAN Groups > Create
This interface provides a list of available VLANs from which you can select members to add to the VLAN group.
You can also configure VLAN Groups via the CLI.
1824113-3 : GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent.
Links to More Info: BT1824113
Component: Global Traffic Manager (DNS)
Symptoms:
Disabling a pool or virtual server that is referenced by a pool member affects how pool <poolname> selects a response, but [active_members <poolname>] still returns a value that ignores these status effects.
Conditions:
-- GTM pool
-- An iRule that checks the available_members of the pool is greater than zero before selecting the pool
-- Disable the pool
The pool is still selected for client queries to the wideIP
Logs show that the available_members is equal to the number of pool members, even though the pool is disabled.
Impact:
Unable to manage availability by disabling the pool.
Workaround:
None
1824009-3 : When DNS64 is enabled, resolver cache passes SERVFAIL responses to the client
Links to More Info: BT1824009
Component: Global Traffic Manager (DNS)
Symptoms:
When a DNS profile is configured with both Secondary DNS64 (and Prefix) and a resolver cache, a response from an authoritative server of SERVFAIL to a AAAA query is sent directly to a client
Conditions:
- DNS64 enabled in the DNS profile
- DNS resolver cache configured
Impact:
SERVFAIL response is directly send back to the client
Workaround:
None
1821353-2 : Error on long wildcard configuration
Links to More Info: BT1821353
Component: Application Security Manager
Symptoms:
When a wildcard url is configured with a size above 1023, the system can't start up.
Conditions:
The wildcard URL length exceed 1023 bytes.
Impact:
Bd goes into restart loop.
Workaround:
Reduce the length of the wildcard URL.
1821089-4 : DNS64 and resolver cache may not function together as expected
Links to More Info: BT1821089
Component: Global Traffic Manager (DNS)
Symptoms:
Wirth DNS64 enabled and also a resolver cache, the first AAAA query for a name that has only an A record and no AAAA record is correctly translated to the configured prefix. However, subsequent queries return only NOERROR to the client instead of the AAAA response.
Conditions:
-- DNS64 enabled with resolver cache
-- AAAA queries
Impact:
Subsequent queries return NOERROR and no record responses
Workaround:
None
1820833-1 : General Database Error when creating a new profile
Links to More Info: BT1820833
Component: Bot Defense
Symptoms:
When creating a custom bot defense profile, after clicking Finished an error occurs: "General Database Error"
Conditions:
-- Creating a custom mobile bot defense profile
-- The profile enables mobile endpoints
-- The parent profile has been modified
Impact:
The profile is not created and a General Database Error is reported.
Workaround:
None
1820573-2 : PEM Traffic Classification signatures are classifying the youtube videos with quic enabled as udp.quic instead of udp.quic.youtube.youtube_video.youtube_video_abr on windows using the latest chrome web browser
Links to More Info: BT1820573
Component: Traffic Classification Engine
Symptoms:
Classification is not happening properly
Conditions:
YouTube video playing on the latest version of Chrome web browser
Impact:
Classification is incorrect
Workaround:
None
1820489-2 : Rule list order changes when modifying a rule using Filer Active Rules List
Links to More Info: BT1820489
Component: Advanced Firewall Manager
Symptoms:
Firewall Policy rule ID changes when Modifying a rule using "Filer Active Rules List" and commit the changes.
Conditions:
- AFM licensed and provisioned.
- Create a rule-list with 4-5 rules in it.
- Create a Policy and add rule-list under it.
- Now Filer any of 2 Active Rules from rule List and then the Rule ID order changes, Now do any modification on filtered rules and commit the changes.
- Now remove the filter and observe the Rule ID changes for all the rules once after commit the changes.
Impact:
May lead to a change in the rule order and priority.
Workaround:
Remove the filter before committing the changes.
1819813-2 : [APM][NTLM]TMM core on null _ntlm_msg on 17.1.x on top of ID1495381
Links to More Info: BT1819813
Component: Access Policy Manager
Symptoms:
Tmm cores while APM looks up a session.
Conditions:
SWG explicit forward proxy with NTLM or Kerberos credentials identification method.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1813717-4 : Some blocked requests are not logged when filtered by response status codes
Links to More Info: BT1813717
Component: Application Security Manager
Symptoms:
Blocked requests with status code N/A are not logged when filtered by response code
Conditions:
-- Using a custom logging profile with request type set to all requests or blocked requests, logic operation AND and Response status code set to ONLY
Impact:
Missing logs of some blocked requests
Workaround:
None
1798601-4 : BD restart loop after upgrade on error in CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES★
Links to More Info: BT1798601
Component: Application Security Manager
Symptoms:
After upgrade, bd goes into a restart loop. An error is logged to /var/log/bd.log:
ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_INTERNAL_PARAMETERS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.061|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ENFORCER_ACCOUNTS res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.063|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_LANGUAGE_CHARSET res:[0]
ECARD_POLICY|NOTICE|Feb 01 21:35:01.067|21460|table_funcs.cpp:1471|handle_table_dynamic CONFIG_TYPE_ACCOUNT_CHARSET_TEMPLATES res:[0]
BD_MISC|ERR |Feb 01 21:35:01.070|21460|temp_func.c:2296|CONFIG_TYPE_PROTOBUF_FILENAMES message had parsing error: could not parse protobuf message
Conditions:
There is a licensing change on a device, and there is a policy that does not have any JSON profiles that have metacharElementCheck enabled.
Impact:
BD restarts in a loop. Traffic disrupted while bd restarts.
Workaround:
Run the following SQL on an affected system(s).
UPDATE DCC.ACCOUNT_CHARSET_TEMPLATES AS target JOIN (SELECT policy_name_crc, charset FROM DCC.ACCOUNT_CHARSET_TEMPLATES WHERE charset_templ_id = 2) AS source ON (target.policy_name_crc = source.policy_name_crc AND target.charset = '') SET target.charset = source.charset;
1788193-3 : [MCP] Request logging should only be allowed with supported protocol profiles
Links to More Info: BT1788193
Component: TMOS
Symptoms:
Request Logging can only log HTTP requests. Other protocol profiles are not supported. Configuring request logging on a MQTT virtual server will cause tmm to crash.
Conditions:
Request logging profile is configured on MQTT virtual server
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1788065-1 : The rule cannot be deleted because it is in use by a rule
Links to More Info: BT1788065
Component: Local Traffic Manager
Symptoms:
When trying to delete two iRules in same transaction with one is calling the proc defined in another the deletion fails with below error.
mcpd[6467]: 01070265:3: The rule (/Common/Shared/library_irule) cannot be deleted because it is in use by a rule (/Common/Shared/example_irule).
The rules are
- "library_irule" containing procedure do_nothing
- "example_irule" that calls proc do_nothing
- Virtual "my_vs1" that attaches "example_irule"
Conditions:
-- Two iRules exist.
-- One iRule calls a procedure defined in the other iRule.
-- You attempt to delete both iRules at the same time.
Impact:
Unable to delete the iRule.
Workaround:
Try to delete the iRules in different transactions.
1787981-3 : Memory leak in ips_pcb_cache
Links to More Info: BT1787981
Component: Protocol Inspection
Symptoms:
The ips_pcb_cache stat keeps increasing while the system is passing traffic.
Conditions:
- IPS licensed and provisioned.
- Port missing from service or
- Port configured for service that does not match traffic.
Impact:
Increased memory usage of ips_pcb_cache and may lead to tmm crash. Traffic disrupted while tmm restarts.
Workaround:
Add TCP port (e.g., port 443) to the respective service on the IPS profile. For example, with a virtual-server that is configured with port 443, the port should be added to HTTP service if it terminates SSL (e.g., has client-ssl profile), otherwise the SSL service.
1787621-2 : TMM may unexpectedly restart during IPsec tunnel negotiation
Links to More Info: BT1787621
Component: TMOS
Symptoms:
Tmm crashes while passing IPSec traffic
Conditions:
-- IPsec IKEv2 tunnel configured and in use
-- The IPsec attempts to establish a tunnel with the remote peer
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1785385-2 : Intermittent traffic failures when tenant is running BIG-IP v17.1.2 or above and host is on version prior to F5OS-A 1.8.0 or F5OS-C 1.8.0★
Links to More Info: BT1785385
Component: Local Traffic Manager
Symptoms:
Intermittent traffic failures for a tenant running BIG-IP v17.1.2 or above.
This often manifests as ICMP monitors failing.
Conditions:
- Tenant running BIG-IP v17.1.2 or above
- Host is one of the following platforms:
-- r5000, r10000, or r12000-series appliance
-- VELOS
- Host is running a version prior to F5OS-A 1.8.0 (rSeries appliance) or F5OS-C 1.8.0 (VELOS chassis)
Impact:
Intermittent traffic disruption. This often manifests as ICMP monitors intermittently failing, but will also impact virtual server traffic and other protocols (e.g. UDP and TCP).
Workaround:
Upgrade F5OS to version 1.8.0 or higher.
1784137-1 : Net stp-globals object config-name back to default value upon reboot
Links to More Info: BT1784137
Component: TMOS
Symptoms:
Net stp-globals config-name is reset to default "base mac" in running config, while bigip_base.conf has custom config-name.
This behavior is seen after upgrade to v17.1.1.3 and also when reboot the device when its in v17.
Conditions:
1. Upgrade to v17.1.1.3
2. Reboot the device after changing the config-name in stp-globals.
Impact:
Any changes to net stp-globals will revert to default after reboot.
Workaround:
Configure via startup script after MCPD is found running when the BIG-IP system starts up.
1783217-1 : Rare bd crash
Links to More Info: BT1783217
Component: Application Security Manager
Symptoms:
A rare bd crash on some conditions related to json parsing
Conditions:
-- ASM provisioned, passing traffic
-- JSON parsing occurs
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1782137-2 : Management of Wide IPs using the GUI may fail when multiple monitors exist
Links to More Info: BT1782137
Component: Global Traffic Manager (DNS)
Symptoms:
When multiple monitor instances exist, the GUI may become unresponsive when managing Wide IPs.
Conditions:
- GTM configuration contains a sufficiently high number of monitors (> 4000).
- Using the GUI to manage Wide IPs.
Impact:
Configuration changes through the GUI may not be effective. Unable to use the GUI for configuration management.
Workaround:
Use TMSH
1782057-2 : BD crash related to dns lookup
Links to More Info: BT1782057
Component: Application Security Manager
Symptoms:
A bd daemon crash
Conditions:
Related to DNS lookup scenarios
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1758961-4 : TMM may core if proxy_common_init errors out due to inappropriate NAT configuration
Links to More Info: BT1758961
Component: Local Traffic Manager
Symptoms:
TMM core is generated and tmm is restarted.
Conditions:
When proxy_common_init() fails due to incorrect configuration of a transparent HTTP proxy in non-standard HTTP and pass-through mode, it only occurs when an ACK and data are received during the connection setup.
Impact:
The core will be generated, and the TMM will be restarted accordingly. Traffic disrupted while TMM restarts.
Workaround:
None
1756897-2 : [APM][PA]Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'
Links to More Info: BT1756897
Component: Access Policy Manager
Symptoms:
Application fails to load with below console error in developer tools.
Uncaught TypeError: Failed to execute 'observe' on 'MutationObserver': parameter 1 is not of type 'Node'.
Conditions:
Portal Access configured.
Impact:
Unable to load application via portal access.
Workaround:
Customized cache-fm-Modern.js ifile workaround is available for this.
1755413-2 : Fast scp file transfer may not display progress bar
Links to More Info: BT1755413
Component: TMOS
Symptoms:
- Missing progress bar on scp file transfer.
Conditions:
- Includes fix for CVE-2019-6109.
Impact:
The progress bar indicating download progress of scp file transfer is missing in the output.
Workaround:
None
1755113-4 : BD crash with specific JSON schema
Links to More Info: BT1755113
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1753489-2 : BFD Commands Missing in ZebOS Config After Reboot or Restart for large configurations
Links to More Info: BT1753489
Component: TMOS
Symptoms:
BFD session commands are missing from the ZebOS configuration after a BIG-IP reboot or bigstart restart.
Conditions:
Occurs consistently with 40+ route domains, intermittently with 20+ route domains, and varies based on configuration size or the number of BFD commands.
Impact:
BFD session configurations are not retained after reboot/restart, causing instability in routing protocols relying on BFD.
Workaround:
None
1708189-3 : ICMP errors with HSL can rarely cause tmm cores
Links to More Info: BT1708189
Component: Local Traffic Manager
Symptoms:
High-speed logging configured to use a remote syslog server can cause tmm to core if the server sends back ICMP errors (like ICMP unreachable).
Conditions:
-- High Speed Logging to a remote syslog server
-- Remote server sends back ICMP errors
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1697041-2 : TMM may fail to start, device is inoperative★
Links to More Info: BT1697041
Component: Local Traffic Manager
Symptoms:
In very rare circumstances, tmm may fail to start and log a message similar to the following:
/var/log/tmm:
notice vmxnet3(1.3)[1b:00.0]: Waiting for tmm1 to reach state 1...
/var/log/tmm1:
notice Failed to connect to TMROUTED: ERR_INPROGRESS. Try again in 10 seconds.
notice MCP connection expired early in startup; retrying
While the issue is occurring, there will be incomplete ARP entries for tmm.
# arp -an | grep 127.1.1.
? (127.1.1.2) at <incomplete> on tmm
? (127.1.1.3) at <incomplete> on tmm
? (127.1.1.4) at <incomplete> on tmm
? (127.1.1.6) at <incomplete> on tmm
? (127.1.1.7) at <incomplete> on tmm
? (127.1.1.8) at <incomplete> on tmm
Conditions:
-- BIG-IP VE
-- Hypervisor under high load
This has also been reported to occur after the reboot during an upgrade.
Impact:
Tmm is unable to start
Workaround:
Restart tmm manually with
bigstart restart tmm
Alternatively, set up a static arp mapping on the linux host:
arp -s 127.1.1.2 00:01:23:45:67:01
arp -s 127.1.1.3 00:01:23:45:67:02
arp -s 127.1.1.4 00:01:23:45:67:03
arp -s 127.1.1.5 00:01:23:45:67:04
arp -s 127.1.1.6 00:01:23:45:67:05
arp -s 127.1.1.7 00:01:23:45:67:06
arp -s 127.1.1.8 00:01:23:45:67:07
If there are more than 8 tmms, the following script can be used:
for y in $(seq $(/usr/bin/getdb Provision.tmmCountActual)); do arp -s 127.1.1.$(($y+1)) 00:01:23:45:67:$(printf "%02g" $y); done
1690005-2 : Masquerade Mac is not removed when F5OS is rebooted
Links to More Info: BT1690005
Component: F5OS Messaging Agent
Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd
Conditions:
- A HA pair of tenants is used
- A traffic group uses a masquerade mac
- The Active tenant is rebooted
Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.
Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit
1688545-2 : PVA-processed traffic is not included in the route-domain stats via SNMP
Links to More Info: BT1688545
Component: TMOS
Symptoms:
PVA traffic sent to the VIP is not reflected in the route-domain statistics within SNMP.
Conditions:
Viewing ltmRouteDomainStat* route domain statistics in F5-BIGIP-LOCAL-MIB
Impact:
Discrepancy between the throughput statistics and traffic statistics on per-VLAN basis
Workaround:
None
1678105-3 : F5OS tenant, TMM crashing after loading a UCS
Links to More Info: BT1678105
Component: TMOS
Symptoms:
If a UCS is loaded on a F5OS tenant and the name of the tenant from where the UCS was saved does not match the tenant name where it is restored.
Conditions:
- UCS created on a tenant name foo.
- UCS restored on tenant named bar.
Impact:
The tenant will not become operational because TMM fails to start.
Workaround:
Refer to following steps for workaround:
1. Remove the file "tmm_velocity_init.tcl" in /config/.
2. Perform bigstart restart platform_agent.
3. Ensure a new "tmm_velocity_init.tcl" is created and TMM stops failing.
1677905-4 : Performance improvement on a specific scenario
Links to More Info: BT1677905
Component: Application Security Manager
Symptoms:
Performance on requests with many parameters is not satisfactory on top-end machine with many CPUs.
Conditions:
Traffic with hundreds of parameters arriving to machine is with many CPUs
Impact:
The performance does not correlate with the number of CPUs.
Workaround:
None
1670625-3 : Incorrect set of TCAM rules
Links to More Info: BT1670625
Component: TMOS
Symptoms:
Incorrect set of TCAM rules.
Conditions:
Multiple hardware acceleration features are activated simultaneously.
Impact:
Hardware offload does not function properly, only software protection is available.
Workaround:
None
1670225-4 : 'Last Error' field remains empty after initial monitor Down status post-reboot
Links to More Info: BT1670225
Component: Local Traffic Manager
Symptoms:
After rebooting the BIG-IP system, the 'Last Error' field in the /var/log/ltm log for a TCP monitor shows as empty (null) following the first occurrence of the monitor's down status.
mcpd[6893]: 01070638:5: Pool /Common/http_pool member /Common/192.168.10.71:80 monitor status down. [ /Common/my_tcp_monitor: down; last error: ] [ was up for 0hr:0min:41sec ]
And If pool member goes back to 'up' and then 'down' again, 'last error:' string is not empty, but the 'last error" string is not the most recent failure reason following.
mcpd[8820]: 01070638:5: Pool /Common/http_pool member /Common/10.2.116.207:80 monitor status down. [ /Common/myhttpmon: down; last error: /Common/myhttpmon: Response Code: 200 (OK) @2024/12/09 00:14:23. ] [ was up for 0hr:0min:32sec ]
Conditions:
The issue occurs when the monitor status of system is up and rebooted and during the first occurrence of a monitor's down status following the reboot, and pool member goes back to 'up' and then 'down' again.
Impact:
Users may not be able to determine the cause of monitor failures immediately after a system reboot, and pool member goes back to 'up' and then 'down' again. as the 'Last Error' field does not provide the necessary diagnostic information
Workaround:
None
1624557-3 : HTTP/2 with RAM cache enabled could cause BIG-IP to return HTTP 304 with content
Links to More Info: BT1624557
Component: Local Traffic Manager
Symptoms:
When the server replies to BIG-IP with HTTP 304 (not modified) and the BIG-IP system returns the contents of the RAM cache, it will not change the HTTP code 304 returned by the server when sending the cached content back to the client. The client will reject the HTTP 304 with content since it is expecting 200 OK with content.
Conditions:
-- Content in RAM cache has expired
-- The BIG-IP system requests an update from the origin server
-- The origin server returns 304 Not Modified.
Impact:
The BIG-IP system sends the response to the client as a 304 along with the content, causing the client to reject the content.
Workaround:
Disable RAM cache or alternatively have the server never return HTTP 304 but rather the content with 200 OK, even if unchanged.
1623921-3 : IPencap monitor probes from bigd are prone to connection re-use.
Links to More Info: BT1623921
Component: Local Traffic Manager
Symptoms:
When using a DNS monitor with IP encapsulation, TMM handles probe encapsulation. Bigd reuses source ports after closing sockets quickly, but TMM applies a 30-second timeout, leading to connection re-use. This can result in probes being incorrectly encapsulated to the wrong pool member, causing inaccurate health monitoring
Conditions:
1. DNS monitor configured with 'transparent' destination and IP encapsulation enabled.
2. Large number of pool members (e.g., 60).
Impact:
Probes may be encapsulated to the wrong destination, leading to inaccurate health monitoring of pool members.
Workaround:
None
1615081-4 : Remove SHA and AES Constraint Checks in SNMPv3
Links to More Info: BT1615081
Component: TMOS
Symptoms:
SNMPv3 user cannot be created with a combination of SHA-2 and AES.
The following errors are observed:
> 'SHA-256 + AES' returns "The AES privacy protocol keys cannot be shorter than 192 with SHA-2 auth protocol."
> 'SHA-512 + AES' returns "The AES privacy protocol keys cannot be shorter than 192 with SHA-2 auth protocol."
> 'SHA + AES-256' returns "SHA-2 auth protocol is required with longer AES keys."
> 'SHA + AES-192' returns "SHA-2 auth protocol is required with longer AES keys."
Conditions:
- Creating SNMPv3 user with combination of SHA-2 and AES.
Impact:
Unable to create SNMPv3 user with lower keys.
Workaround:
None
1607277-4 : Permission Denied error when trying to download the Windows Client Package from Connectivity Profile on Standby
Links to More Info: BT1607277
Component: Access Policy Manager
Symptoms:
An exception occurs when trying to download the Windows Edgeclient package
clientdownload.DownloadHandler:error -
java.io.FileNotFoundException: /var/tmp/BIGIPEdgeClient.exe (Permission denied)
Conditions:
-- On standby device
-- Windows Edgeclient package download
Impact:
Unable to download the Windows EdgeClient Package.
Workaround:
None
1602641-5 : Configuring verified-accept and SSL mirroring on the same virtual results in stalled connections.
Links to More Info: BT1602641
Component: Local Traffic Manager
Symptoms:
If a virtual server has SSL mirroring and with verified-accept enabled, the set handshake timeout value will be delayed during the SSL handshake client connections. The standby unit will not copy the connection to the virtual server.
Conditions:
- Verified accept enabled
- SSL mirroring enables
- An HA pair
Impact:
- SSL connections delayed inside the SSL handshake
- SSL connections are not mirrored to the peer unit.
Workaround:
Disable mirroring or disable verified-accept.
1602629-4 : Tmm_mcpmsg_print can trigger SOD
Links to More Info: BT1602629
Component: TMOS
Symptoms:
TMM is killed by SOD.
Conditions:
Conditions are unknown, it was encountered when ID 1047789 was encountered, see https://cdn.f5.com/product/bugtracker/ID1047789.html
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1599841-1 : Partition access is not synced to Standby device after adding a remote user locally.
Links to More Info: BT1599841
Component: TMOS
Symptoms:
The local user created for the remote user does not have the same partition access for Standby device as it does for the Active device in the HA pair.
Conditions:
1) Log into the Active device as a remote user
2) Create a local user for this remote user (same name for the user)
3) Sync to the BIG-IP HA peer.
Impact:
The local user created has access only to the Active device and cannot login to the Standby one.
Workaround:
None
1598381-1 : Unable to set the key-usage setting while renewing the CSR
Links to More Info: BT1598381
Component: Local Traffic Manager
Symptoms:
While renewing the CSR, key-usage value is set to empty.
Conditions:
While renewing the CSR with key-usage.
Impact:
Unable to configure the key-usage when renewing the CSR.
Workaround:
As a workaround, delete the complete certificate from GUI and create it using the below commands on CLI
> tmsh create sys crypto key test100.com key-size 2048 key-type rsa-private
> tmsh create sys crypto csr test100.com common-name \"test100.com\" key test100.com key-usage digitalSignature
Note: Here 'test100.com' is the certificate name.
1596637-2 : TLS1.3 with c3d and ocsp handshake failure
Links to More Info: BT1596637
Component: Local Traffic Manager
Symptoms:
SSL handshakes fail, and TLS clients send 'Bad Record MAC' errors.
Conditions:
-- TLS1.3 connection configured with c3d and ocsp.
Impact:
-- A handshake failure occurs.
Workaround:
Disable ocsp or use TLS1.2.
1596313-2 : Deleting and re-adding a LAG on F5OS causes a validation failure in mcpd, therefore the trunk on the tenant has no interfaces
Links to More Info: BT1596313
Component: TMOS
Symptoms:
When creating an HA group with a trunk in an LTM tenant, after the first reboot an error is thrown.
“Invalid attempt to register an n-stage validator, the stage must be greater than the current stage, and within the range 1 to 101 inclusive, current stage : 7 registered: 5 Unexpected”
Conditions:
-- BIG-IP tenant running on F5OS
-- High availability system
-- HA group with a trunk
-- The tenant is rebooted for the first time
Impact:
No impact on tmm VLAN traffic
Workaround:
Run the 'tmsh create sys ha-group' command again.
1592209-3 : Monitored objects stays "Offline (Enabled)" even after manually enabling the server object after reboot
Links to More Info: BT1592209
Component: Global Traffic Manager (DNS)
Symptoms:
A Generic host server object reports “Offline (Enabled)”.
When enabling the server object, the bellow message is logged to /var/log/gtm:
gtmd[xxxx]: 011a5004:1: SNMP_TRAP: Server /Common/[generic-server] (ip=192.1.1.51) state change blue --> red (No enabled virtual server available)
Conditions:
-- Any operations that cause GTMd to rebuild its probe list. Following are a few example operations:
- Monitored objects being disabled,
- GTMd restart,
- Loss of iQuery to other GTMs,
- Adding or removing probes.
-- BIG-IP is running on a software versions 17.1.1 or 16.1.5 or later versions in which the ID 1133201 is fixed.
Impact:
Virtual servers that are associated with the affected generic server object may stay unavailable. Hence, pool or wideIP, which uses the affected server object, may be unavailable too.
Workaround:
After the issue, restart the GTMd. Generic host server object will be get back to 'Available (Enabled)' status.
Following is an example command to restart the GTMd:
# tmsh restart /sys service gtmd
Global server load balancing is disrupted while gtmd is restarted.
1589421-1 : LTM Monitor not shown in Pool Member "Health Monitors" if Transparent attribute changes
Links to More Info: BT1589421
Component: TMOS
Symptoms:
If an LTM monitor is created with an alias address configured and assigned to a pool or pool member(s), then the monitor's "transparent" attribute is changed (either from enabled to disabled, or from disabled to enabled), the monitor no longer appears in the Local Traffic GUI in the "Health Monitors" list for an affected pool member.
Conditions:
This occurs when all of the following conditions are true:
-- An LTM health monitor is configured with an Alias Address and/or Port (Destination field in TMSH)
-- The monitor is assigned to an LTM pool and/or pool member(s)
-- The monitor's Alias Address and/or Port are different from the address of the assigned pool member
-- After the monitor is assigned to the LTM pool and/or pool member(s), its "transparent" attribute is changed (either from enabled to disabled, or from disabled to enabled)
-- The list of Health Monitors assigned to a given pool member is viewed in the BIG-IP LTM GUI
(Local Traffic --> Pools : Pool List --> select pool --> Members --> select member)
Impact:
The assignment of the monitor to the pool member is not immediately visible in the BIG-IP LTM GUI in the "Health Monitors" list for the affected pool member(s).
When viewing the properties of the pool member in the Local Traffic GUI, if the "Advanced" Configuration view is selected, the Health Monitors assigned to the pool member can be viewed. If the "Inherit from Pool" option is configured, the Health Monitors assigned to the pool can be viewed under the Properties tab for the pool.
Workaround:
When viewing the properties of the pool member in the BIG-IP LTM GUI, if the "Advanced" Configuration view is selected, the Health Monitors assigned to the pool member can be viewed. If the "Inherit from Pool" option is configured, the Health Monitors assigned to the pool can be viewed under the Properties tab for the pool.
1589269-3 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★
Links to More Info: BT1589269
Component: SSL Orchestrator
Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.
Conditions:
Any BIG-IP device running software version 16.1.0 or higher.
Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.
No impact on upgrade if value of sys db provision.extramb is 4096 or less. After the upgrade, it is not possible to increase the value above 4096.
If greater than 4096 the value will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave device with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure such as oom killer killing processes, poor scheduling of processes which may cause core dumps, and sluggish management access.
Workaround:
None
1587453-2 : “default-all” profile is selected by default in “Dynamic LAN address spaces”
Links to More Info: BT1587453
Component: Access Policy Manager
Symptoms:
“default-all” profile is selected by default in “Dynamic LAN address spaces” when a new Network Access Connection is created
Conditions:
Create a new Network access resource
Impact:
Split tunnel will be ignored and the connection will be full tunnel due “default-all” profile being selected by default in “Dynamic LAN address spaces”
Workaround:
Remove "default-all" from “Dynamic LAN address spaces”
1586745-2 : LACP trunk status became DOWN due to bcm56xxd failure
Links to More Info: BT1586745
Component: TMOS
Symptoms:
Lacp, lldp reports trunk(s) down and you may observe the below logs.
err lldpd[7489]: 01570004:3: HAL send PDU failed
err lldpd[7489]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lldpd[7489]: 01570004:3: HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: ING_SERVICE_COUNTER_TABLE_X.ipipe0 interrupt timeout
err lacpd[10571]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lacpd[10571]: 01160005:3: HalMsgHandler.cpp:125 - HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: FP_COUNTER_TABLE_X.ipipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: EFP_COUNTER_TABLE_X.epipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
Conditions:
Not known at this time.
Impact:
An outage was observed
Workaround:
Restart bcm56xxd, lldpd, lacpd process.
1586405-3 : "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page
Links to More Info: BT1586405
Component: Access Policy Manager
Symptoms:
Observe multiple "/f5-h-$$/" in URLs when accessing via Protected Access.
Conditions:
"<base href="xxxxx">" tag in the home page.
Impact:
URLs become lengthy upon every refresh and may lead to webapp misfunction.
Workaround:
Customized iRule
======================
when REWRITE_REQUEST_DONE {
if { [HTTP::path] ends_with "path_to_file1" } {
REWRITE::post_process 1
set rewrite_new 1
}
if { [HTTP::path] ends_with "path_to_file2" } {
REWRITE::post_process 1
set rewrite_new1 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists rewrite_new]} {
unset rewrite_new
set rewrite_str {<base href=""f5-h-$$path_in_file1"">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file1">}
}
}
if {[info exists rewrite_new1]} {
unset rewrite_new1
set rewrite_str {<base href="f5-h-$$/path_in_file2">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file2">}
}
}
}
======================
1581685-4 : iRule 'members' command counts FQDN pool members.
Links to More Info: BT1581685
Component: Local Traffic Manager
Symptoms:
iRule 'members' command counts and lists FQDN pool members.
Conditions:
- create a pool with at least one FQDN member.
- use the members function in an iRule.
Impact:
iRule with members command will not give the desired result.
Workaround:
When FQDN pool members are present, using the 'members' command in the iRule will not yield the desired result.
1574521-2 : Intermittent high ICMP latency on R4000 and R2000 tenants
Links to More Info: BT1574521
Component: Performance
Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher ICMP latency.
This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.
CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html
Conditions:
BIG-IP tenants on R4000 and R2000 platforms
Impact:
High ICMP latency and jitter can be observed.
Workaround:
None
1571817-4 : FQDN ephemeral pool member user-down state is not synced to the peer device
Links to More Info: BT1571817
Component: TMOS
Symptoms:
One or more FQDN ephemeral pool members on a device group member is showing an incorrect state for the pool member.
Conditions:
1. Create the FQDN pool with an FQDN template pool member and ensure that the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
2. On one member of the device group, modify the state of the FQDN template pool member to 'user-down'.
3. Synchronize the configuration to the device group.
4. Check the status of the pool on the same member of the HA pair and verify that the state of any ephemeral pool member associated with the FQDN template pool member is 'user-down'.
5. On the other member of the device group, the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
Impact:
The state of the ephemeral pool members on one member of the device group is incorrect.
Workaround:
None
1560449-2 : Rest_logintegrity does not suppress output to stderr
Links to More Info: BT1560449
Component: TMOS
Symptoms:
The find command in rest_logintegrity script fails and returns "No such file or directory" when no matching file is found if there are no newly rotated restnoded, restjavad log files whenever the rest_logintegrity script runs as part of the cron job.
Conditions:
When there are no files which matches the below patterns in the script:
"/var/log/restjavad.[1-9]*.log", "/var/log/restnoded/restnoded[1-9]*.log".
Impact:
Overload of emails with message similar to:
find: '/var/log/restnoded/restnoded[1-9]*.log': No such file or directory
Workaround:
Creating the files as below mitigates the error
touch /var/log/restnoded/restnoded1.log
touch /var/log/restjavad.1.log
1553169-4 : Parsing tcp payload using iRules can be inaccurate because of binary to string conversion
Links to More Info: BT1553169
Component: Local Traffic Manager
Symptoms:
When an iRule is used to parse tcp payload, the value returned as string can be inaccurate.
Conditions:
TCP payload is parsed using iRule.
Impact:
The iRule functionality may not work as expected, as the parsed data can be inaccurate.
Workaround:
None
1549397-4 : Pool member from statically-configured node deleted along with ephemeral pool member using same IP address
Links to More Info: BT1549397
Component: Local Traffic Manager
Symptoms:
If an LTM pool is created containing both FQDN and statically-configured pool members using different port numbers, and the FQDN name resolves to the same IP address as the statically-configured node, if the FQDN name no longer resolves to that IP address, the statically-configured pool member may be deleted along with the ephemeral pool member with the same IP address.
In this configuration, the pool in question may be found to contain:
-- a statically-configured (not ephemeral) pool member referencing the statically-configured node
-- an ephemeral pool member with the same node name and IP address as the statically-configured node
Both pool members have the same node name and IP address, since only one node can exist for a given IP address. This prevents a separate ephemeral node from being created with the same IP address as the statically-configured node, forcing both pool members to reference the same statically-configured node with the given IP address.
Conditions:
-- The LTM pool contains both FQDN pool members and pool members referencing statically-configured nodes.
-- The FQDN and statically-configured pool members use different port numbers.
-- The FQDN name resolves to one or more IP addresses that match the statically-configured node.
-- The DNS server subsequently no longer resolves the FQDN name to that IP address.
Impact:
Pool members may be deleted unexpectedly when DNS records/name resolution changes.
Workaround:
To work around this issue:
-- Use the same port number for both statically-configured pool members and FQDN pool members.
-- Add the statically-configured pool member(s) to the pool before adding any FQDN pool members which resolve to the same IP address(es).
1510477-4 : RD rule containing zones does not match expected traffic on the Network firewall policy
Links to More Info: BT1510477
Component: Advanced Firewall Manager
Symptoms:
The ICMP packets are dropped based on the default match rule, instead of the RD rule match.
Conditions:
ICMP firewall policies created with Zone include Route Domain (RD) with two or more VLANs in the created Zone.
Impact:
The ICMP packets are dropped based on the default match rule instead of using the RD rule match to drop.
Workaround:
None
1505257-2 : False positive with "illegal base64 value" for Authorization header
Links to More Info: BT1505257
Component: Application Security Manager
Symptoms:
False positive "illegal base64 value" is detected
Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".
Impact:
A false positive is detected.
Workaround:
None
1481889-4 : High CPU utilization or crash when CACHE_REQUEST iRule parks.
Links to More Info: BT1481889
Component: Local Traffic Manager
Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.
Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc
Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.
Workaround:
- Removal of CACHE_REQUEST iRule if avoidable
1474877-4 : Unable to download large files through VIP due RST Compression error.
Links to More Info: BT1474877
Component: Local Traffic Manager
Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)
Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.
Impact:
- Client may lose connection to the server.
Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :
when HTTP_REQUEST {
if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
set no_rewrite 1
}
}
when HTTP_RESPONSE {
if { $no_rewrite == 1 } {
REWRITE::disable
}
}
1473913-6 : Proxy Connections drop due to wrong counting
Links to More Info: BT1473913
Component: Local Traffic Manager
Symptoms:
Proxy Connections are dropped. The reset cause in a package capture indicates "F5RST: Not connected"
Conditions:
Can happen during a DOS attack with standard mitigation mode enabled.
Impact:
Random connections are dropped
Workaround:
Use conservative mitigation mode.
1411365-1 : CMP forwarded flows can be removed by other CMP forwarded flows incorrectly
Links to More Info: BT1411365
Component: Local Traffic Manager
Symptoms:
BIG-IP may fail to forward server-side traffic if flow forwarding occurs due to an overload scenario, specifically due to flow collisions on the server-side connection when using the source-port preserve-strict option with UDP virtual configuration.
Conditions:
BIG-IP configured with UDP virtual configuration with source-port preserve-strict.
- CMP forwarding occurs when traffic on ingress is managed by a different TMM on egress.
- Overload condition occurs on TMM that leads to forwarding the flow by keeping server-side connection.
- Forwarded flow causes existing connection flow to be removed and interrupts current traffic flow.
Impact:
Forwarding flow removes the existing flow and causes traffic to be dropped.
Workaround:
Clear the existing connection from the connection table. For more information, refer to the article K53851362: Displaying and deleting BIG-IP connection table entries from the command line.
1410441-3 : Large file transfer over SFTP/SSH proxy failure
Links to More Info: BT1410441
Component: Advanced Firewall Manager
Symptoms:
Large file (> 110MB) transfer failed using put command over SFTP/SSH Proxy enabled.
Conditions:
OpenSSH client/Server version <8.2p1
SSH Proxy profile attached to BIG_IP VS.
Large file(110MB) transfer using the Put command.
Impact:
File transfer failed.
Workaround:
Slow down the file transfer in kb/sec rate.
Ex:
sftp -l 1000 <VS-IP>
put <filename>
1403869-5 : CONNFLOW_FLAG_DOUBLE_LB flows might route traffic to a stale next hop
Links to More Info: BT1403869
Component: TMOS
Symptoms:
Pool members configured with IP encapsulation or any type of flow using CONNFLOW_FLAG_DOUBLE_LB flag might take some time to refresh its nexthops.
Conditions:
BIG-IP receives an ECMP route towards a server over two different BGP peers and the server is a pool member with IPIP encapsulation enabled. One of the BGP peers goes down and the route gets removed immediately, but BIG-IP is still forwarding traffic to this peer for the next few seconds, even though tmm.inline_route_update is enabled.
Impact:
The connection is using the old, invalid next hop for a few seconds.
Workaround:
None
1399017-6 : PEM iRule commands lead to TMM crash
Links to More Info: BT1399017
Component: Policy Enforcement Manager
Symptoms:
In a few circumstances PEM iRule commands lead to a TMM crash.
Conditions:
PEM iRule commands
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1395349-1 : The httpd service shows inactive/dead after "bigstart restart httpd"
Links to More Info: BT1395349
Component: TMOS
Symptoms:
The systemd service unit for httpd shows a status of inactive (dead) after you restart httpd using bigstart restart httpd. For example:
# systemctl status httpd
* httpd.service - LSB: start and stop Apache HTTP Server
Loaded: loaded (/etc/rc.d/init.d/httpd; enabled; vendor preset: enabled)
Active: inactive (dead) since Mon 2023-11-13 09:55:06 GMT; 5s ago
In versions v15.1.10.5 and above in v15.1.x, v16.1.5 and above in v16.1.x, and v17.1.1.4 and above, if a system is affected by this and then a user or process restarts httpd via systemd, the GUI will stop responding and return 403 Forbidden errors. This happens when attempting to renew or update the device certificate via the GUI.
Conditions:
Executing the command bigstart restart httpd. This will also happen behind-the-scenes when making HTTP configuration changes via tmsh/the GUI/iControl.
Impact:
httpd is running normally, but systemd is not aware of it.
Workaround:
To confirm httpd is running, you can use the following commands:
bigstart status httpd
OR
ps ax | grep '[h]ttpd'
If you would like to clear the stale state, restart httpd via its systemd service unit twice:
systemctl restart httpd && systemctl restart httpd
If the GUI is returning 403 Forbidden errors for everything, restart httpd ("systemctl restart httpd && systemctl restart httpd").
1365769-2 : When multiple vlans are in the zone, only some vlans match the ACL-Policy
Links to More Info: BT1365769
Component: Advanced Firewall Manager
Symptoms:
Packets are dropped based on the default match rule instead of actual expected rule.
Conditions:
Firewall policies created with Zone include Route Domain (RD) with two or more VLANs in the created Zone.
Impact:
The packets are dropped based on the default match rule instead of using the RD rule match to drop.
1350485-2 : When the parameter value contains at (@), domain name is not extracting properly
Links to More Info: BT1350485
Component: Application Security Manager
Symptoms:
Request is blocked with Illegal Parameter type violation
Conditions:
Parameter value type should be 'Auto Detect' and enable Illegal data type violation
Impact:
Request blocked if the parameter Url values having '@' followed by other special characters
Workaround:
Change the type to alpha-numeric
1329509-4 : TCL error 'ERR_VAL (line 1) invoked from within "HTTP::path"'.
Links to More Info: BT1329509
Component: Local Traffic Manager
Symptoms:
Under specific conditions, when the client accesses an HTTP(S) virtual server, an iRule execution error occurs. Client-side HTTP(S) connection is terminated by RST when an iRule execution error occurs.
err tmm[xxxxx]: 01220001:3: TCL error: /Common/test-rule <HTTP_REQUEST> - ERR_VAL (line 1) invoked from within "HTTP::path"
Conditions:
This issue occurs under the following conditions:
-- HTTP::path command is used on an iRule.
-- The iRule is attached to an HTTP(S) virtual server.
-- Client's HTTP(S) request URI includes square bracket character, "[" (0x5b) or "]" (0x5d).
-- Client's HTTP(S) request URI includes only opening square bracket "[" or only closing square bracket "]", for example, "GET [ HTTP/1.0\r\n\r\n".
NOTE: When an explicit proxy is configured in the HTTP profile, a client request containing only an opening square bracket "[" will result in the BIG-IP responding with a 400 Bad Request error. In this case, the TCL error may not be visible.
Impact:
The iRule execution fails with a TCL error, as shown in the example below, and the client will receive a TCP RST from the virtual server when the iRule fails to execute.
err tmm[xxxxx]: 01220001:3: TCL error: /Common/test-rule <HTTP_REQUEST> - ERR_VAL (line 1) invoked from within "HTTP::path"
Workaround:
Add "-normalized" command option to HTTP::path command.
ltm rule /Common/test-rule-normalized {
when HTTP_REQUEST {
if { [HTTP::path -normalized] contains "test" } {
HTTP::respond 200 -content "OK !!!\n"
} else {
HTTP::respond 200 -content "Hit \"else\" statement !!!\n"
}
}
}
Note: Adding the "-normalized" command option can change the URI, therefore it is highly recommended to thoroughly test and verify its behaviour before implementing the workaround in a production environment.
1325737-1 : Standby tenant cannot access floating traffic group when MAC masquerade is enabled
Links to More Info: BT1325737
Component: TMOS
Symptoms:
A standby BIG-IP tenant running on an r2000 or r4000 appliance cannot access addresses in the floating traffic group if MAC masquerade is enabled. For instance, the standby tenant will not be able to ping the floating self IP address.
External devices can access the floating self IP address without issue.
If the tenants swap HA roles (the active device becomes standby, and the standby device becomes active), the problem follows the standby device -- the newly-standby system is not able to ping the floating self IP address.
Conditions:
-- F5 r2000 or BIG-IP r4000 system
-- BIG-IP tenant with MAC masquerade configured for floating traffic group
Impact:
Standby tenant unable to access resources in the floating traffic group when MAC masquerade is configured.
Workaround:
None
1322413-5 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device
Links to More Info: BT1322413
Component: TMOS
Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.
Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
tmsh run cm config-sync to-group example-group force-full-load-push
Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.
Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
tmsh mod ltm node example monitor none
(tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
tmsh mod ltm node example monitor my_node_monitor
(tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)
1316481-4 : Large CRL file update fails with memory allocation failure
Component: TMOS
Symptoms:
When updating a large CRL file in BIG-IP using tmsh, the file may be partially read due to internal memory allocation failure.
Please note that the size of the CRL file causing this issue varies across hardware types, network bandwidth and usage, and system resources.
Conditions:
1. Using tmsh, large CRL file is updated to an existing CRL.
2. This large CRL file is attached to multiple profiles.
3. The tmsh modify command is used multiple time in a short span of time that leads to the memory crunch.
Impact:
When large CRL file is attached to the profile which was partially read due to memory allocation failure, the profile gets successfully updated. Connections to VIP with this profile may have unexpected results. For e.g. client connecting to VIP with a revoked client certificate will succeed as the CRL was only partially read.
Workaround:
1. Dynamic CRL / CRLDP on client-ssl profile can be configured to dynamically verify SSL certificate revocation status.
2. OCSP can be enabled on client-ssl profile to validate SSL certificate revocation status.
1305117-2 : SSL profile "no-dtlsv1.2" option is left disabled while upgrading from v14.x or v15.x to 17.1.0★
Links to More Info: BT1305117
Component: TMOS
Symptoms:
Starting from 16.0.0, given DTLSv1.2 support, "no-dtlsv1.2" option is newly available on SSL profile. Default value is "no-dtlsv1.2" option enabled.
While upgrading from older version to 16.0.0 or later, by default "no-dtlsv1.2" option is to be automatically enabled with following notification message.
> bigip1 warning mcpd[XXXX]: 0107185a:4: Warning generated, for version 16.0.0 or greater : /Common/[SSL-profile-name], default option no-dtlsv1.2 set.
However, when user directly upgrades from v14.x/v15.x to v17.1.0, "no-dtlsv1.2" option may not be automatically enabled on SSL profile.
Conditions:
- roll-forward upgrade from v14.x/v15.x to v17.1.0. upgrade from v16.x to v17.1.0 is not affected.
- custom client|server-ssl profile configured on pre-upgrade version v14.x/v15.x
Impact:
After upgrade to 17.1.0, "no-dtlsv1.2" option may not be enabled on SSL profile.
Workaround:
After upgrade to 17.1.0, manually enable "no-dtlsv1.2" option.
1298225-1 : Avrd generates core when dcd becomes unavailable due to some reason
Links to More Info: BT1298225
Component: Application Visibility and Reporting
Symptoms:
Avrd core file generates.
Conditions:
When avrd is writing to the external device and that device is unavailable temporarily.
Impact:
Potential system impact.
Workaround:
None
1295217-1 : When provision.1nic is set to forced_enable the mgmt interface does not respond to ICMP
Links to More Info: BT1295217
Component: TMOS
Symptoms:
When provision.1nic is set to forced_enable the mgmt interface does not respond to ping requests or other ICMP messages.
Conditions:
Provision.1nic is set to forced_enable
Impact:
Not able to ping the mgmt interface.
Workaround:
/sbin/iptables -t raw -I vadc_rawsock_in -p icmp -j ACCEPT
1290937-2 : 'contentWindow' of a dynamically genereated iframe becomes null
Component: Access Policy Manager
Symptoms:
A web application using iframes may not work/render as expected using Portal Access.
Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.
Impact:
Web Application through Portal Access may fails to work/render as expected
Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.
when CLIENT_ACCEPTED {
ACCESS::restrict_irule_events disable
}
when HTTP_REQUEST {
if {
[HTTP::path] ends_with "/cache-fm-Modern.js"
} {
HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
}
}
1282029-1 : Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★
Links to More Info: BT1282029
Component: Advanced Firewall Manager
Symptoms:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector.
If this is after an upgrade it's likely the configuration will fail to load, which in turn will cause memory provisioning not to complete leaving the system provisioned for LTM only. This may leave insufficient 4KB page memory for the actual provisioning, for example if ASM is provisioned. The unit may show low memory symptoms such as oom killer activity, unresponsive management, cores due to daemon heartbeat timeout.
Conditions:
1. The Only Count Suspicious Events option is enabled or the attribute suspicious is true on TCP Push Flood vector.
2. Upgrade to BIG-IP 17.1.0.
Impact:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector. in the console or /var/log/ltm
Failure to load configuration may be shown a few lines later:
emerg load_config_files[13166]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed.
Workaround:
1. Confirm config:
grep "suspicious true" /config/bigip.conf
2. Backup bigip.conf:
cp /config/bigip.conf /config/bigip.conf.bak_ID1282029
3. Change affected configuration values:
sed -i 's/suspicious true/suspicious false/g' /config/bigip.conf
4. Reload MCPD per K13030. AFM comes back up with config loaded fine.
1280141-4 : Platform agent to log license info when received from platform
Links to More Info: BT1280141
Component: F5OS Messaging Agent
Symptoms:
Platform agent to add log to print license info on activated/reinstalled for debuggability.
Conditions:
License activated or reinstalled on platform.
Impact:
No impact
Workaround:
None
1277389-1 : HSB transmitter lockup
Links to More Info: BT1277389
Component: TMOS
Symptoms:
Packets aren't received on the software rx side leading to traffic loss
Conditions:
Unknown
Impact:
HSB lockup with SIGFPE TMM core. Traffic disrupted while tmm restarts.
Workaround:
None
1273161-5 : Secondary blades are unavailable, clusterd is reporting shutdown, and waiting for other blades
Links to More Info: BT1273161
Component: Local Traffic Manager
Symptoms:
On a multi-slot chassis, VCMP guest, or F5OS tenant, clusterd can enter a shutdown state causing some slots to become unavailable.
The event that can cause this is called a partition and occurs when clusterd stops receiving heartbeat packets from a slot over the mgmt_bp interface but is still receiving them over the tmm_bp interface.
Here is the error that is logged when this occurs:
Mar 17 10:38:28 localhost err clusterd[4732]: 013a0004:3: Marking slot 1 SS_FAILED due to partition detected on mgmt_bp from peer 2 to local 1
When this occurs, clusterd enters a shutdown state and at times will never recover.
Here is an example, tmsh show sys cluster command where clusterd is in the shutdown yet waiting state:
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 172.0.0.160/23
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 03/17/23 10:38:30
----------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
----------------------------------------------------------------------------------
| 1 :: :: unknown enabled false unknown shutdown ShutDown: default/1 waiting for blade 2
| 2 :: :: available enabled true standby running Run
Conditions:
Multi-slot chassis, VCMP guest, or F5OS tenant.
A blade determines there is a partition where it's receiving cluster packets over the tmm_bp interface but not the mgmt_bp interface.
Impact:
The unavailable slots/blades will not accept traffic.
Workaround:
Running tmsh show sys cluster will report the primary slot and all slot statuses.
For all blades reporting shutdown or (less likely) initializing and "waiting for blade(s)", restart clusterd on that slot with bigstart restart clusterd. Ensure you do not restart clusterd on the primary slot.
1268373-8 : MRF flow tear down can fill up the hudq causing leaks
Links to More Info: BT1268373
Component: Service Provider
Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.
Conditions:
When the message queue becomes full.
Impact:
TMM memory leak
Workaround:
None
1231889-5 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances
Links to More Info: BT1231889
Component: Local Traffic Manager
Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.
If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.
The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.
Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom
Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:
R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
config type ieee8023adLag
config description ""
aggregation config lag-type LACP
aggregation config distribution-hash src-dst-ipport
aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
config vlan-id 47
config name vlan_47
!
R2000#
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240 # <-- interfaces is not listed
partition ottersPart
[...]
tag 47
}
[root@tenant:Active:Standalone] config #
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240
partition ottersPart
interfaces { # <-- configuration with a workaround in place
LAG {
tagged
}
}
[...]
tag 47
}
Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.
Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.
If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.
Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.
For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:
tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config
1230109-1 : Mcpd memory and CPU increase while getting route stats
Links to More Info: BT1230109
Component: TMOS
Symptoms:
Mcpd CPU usage is high after several hours of repeated requests to /mgmt/tm/net/route/stats. Mcpd can crash and restart.
Conditions:
There are two known paths to the issue:
(1) Repeated making authenticated calls to the /mgmt/tm/net/route/stats endpoint.
(2) Opening a long term tmsh shell and repeatedly checking the route table (show net route).
Impact:
Mcpd memory and CPU increases; if unchecked, mcpd can crash and restart.
Workaround:
(1) Avoid checking the /mgmt/tm/net/route/stat endpoint excessively.
(2) Close tmsh session periodically.
1190753-1 : HTTP/2 Virtual Server ignores customized HTTP known-methods list
Links to More Info: BT1190753
Component: Local Traffic Manager
Symptoms:
An HTTP2 virtual server does not transfer the client request to the backend pool member.
Conditions:
- HTTP profile "Unknown Method : Reject".
- HTTP profile custom "Known Methods" list has non-default values, such as "PATCH".
- HTTP2 profile (and also HTTP profile) is attached to the virtual server.
- Client request is HTTP/2. And HTTP/2 request method is custom one (== method which isn't set as default "known-methods").
Impact:
HTTP2 virtual server traffic is disrupted.
Workaround:
None
1168245-1 : Browser is intermittently unable to contact the BIG-IP device
Links to More Info: BT1168245
Component: TMOS
Symptoms:
When the coloradvisory probes generated by Javascript loaded on the browser do not get responded by the BIG-IP device within 30 seconds, the browser JS generates a pop-up message "Unable to contact BIG-IP device".
Conditions:
- MCPD is busy serving requests.
- Multiple browser connections to the BIG-IP.
- HTTP GET request from browser JS for /xui/update/configuration/alert/statusmenu/coloradvisory does not get responded within 30 seconds (default timeout).
Impact:
Browser frequently sees the BIG-IP as unavailable, causing interruptions to management of the device via the GUI.
Workaround:
1. Increase memory allocated to tomcat and restjavad.
tmsh modify sys db provision.tomcat.extramb value 512
tmsh modify sys db provision.restjavad.extramb value 2227
NB these are very large values, not suitable for most systems. It is probably best to increase tomcat heap size by 50MB a time, and restjavad by 200MB a time (value 600, 800, etc).
To have provision.restjavad.extramb values will be capped in effect to 384 + value of provision.extramb.
Both tomcat and restjavad need to be restarted to have changes take effect. restjavad will log startup info in ltm log.
2. Adjust the browser-based Javascript status update interval and timeout.
2.1. Remount /usr partition as read-write using the command:
mount -o remount,rw /usr
2.2. Edit the file /usr/local/www/xui/framework/scripts/variables.js, and modify the variables: time_updateXui to 8, and timeout_status to 60.
Default values are:
var time_updateXui = 5; // Seconds
var timeout_status = 30; //Timeout value for XUI status update
Change these values to:
var time_updateXui = 8; // Seconds
var timeout_status = 60; //Timeout value for XUI status update
2.3. Remount /usr partition back to read-only.
mount -o remount,ro /usr
3. Restart associated daemons:
bigstart restart httpd
bigstart restart tomcat
bigstart restart restjavad
1128033-4 : Neuron client constantly logs errors when TCAM database is full
Links to More Info: BT1128033
Component: Local Traffic Manager
Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.
Symptomatic logs on tenant:
in /var/log/ltm, repeating logs are recorded, following is an example:
err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))
in /var/log/tmm, cycles of following group of logs are recorded:
notice neuron_client_negotiate: Neuron client connection established
notice [DDOS Neuron]Neuron daemon started
notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
notice [DDOS Neuron]Neuron daemon stopped
For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.
Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.
Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.
Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.
Workaround:
None
1125381-5 : Extraneous warnings recorded in when using only intermediate certificates
Links to More Info: BT1125381
Component: Local Traffic Manager
Symptoms:
When client authentication is enabled on the client SSL profile but the trusted-ca file includes only an intermediate certificate and no CA root cert to build the whole cert chain, although the TLS connection is made, as expected, there is an error message reported.
Conditions:
Trusted-ca includes only inter-cert and no root CA-cert
is configured.
Impact:
Although the TLS handshake succeeds without any issue and the connection is processed, as expected, a confusing warning is reported.
Workaround:
Because the connection is made, you can safely ignore this message.
Note: This issue does not occur if the root CA cert is also configured in the CA-cert bundle.
1110485-7 : SSL handshake failures with invalid profile error
Links to More Info: BT1110485
Component: Local Traffic Manager
Symptoms:
1. TMM reports SSL handshake failures with reason "hud_ssl_handler:1208: alert(40) invalid profile unknown on VIP"
2. There will be Certificate read errors in the ltm log "reading: Unknown error."
Conditions:
-- The certificates associated with the SSL profile are corrupted by modifying/adding/deleting them manually/Venafi
-- There are frequent unintentional Certificate updates
Impact:
-- The BIG-IP system will not be able process the traffic
-- All traffic to particular virtual servers fails
Workaround:
1. Correct the certificates which are corrupted and make them valid.
2. Deattach/Remove the corresponding SSL profile from all virtual servers to which it is applied.
3. In the GUI open the virtual server and click on update and make sure there are no errors shown on the screen.
4. Now re-apply the SSL profile to the virtual server
1106489-5 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.
Links to More Info: BT1106489
Component: TMOS
Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".
Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".
Impact:
Performance is degraded.
Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on
Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload
1105361-2 : Unable to deploy BIG-IP on Azure with D series(v5) or E series(v5) instance types★
Links to More Info: BT1105361
Component: TMOS
Symptoms:
When the BIG-IP is deployed with either D series(v5) or E(v5) series, the Azure is unable to add a route to Azure which is used by Azure to communicate with the instance. It is throwing DHCP timeout error as below. Due to this, Azure is unable to communicate and fetch the status and other details of the instances deployed.
Conditions:
When the BIG-IP is deployed with either D series(v5) or E(v5) series
Impact:
Deployment of BIG-IP on Dv5/Ev5 series timeout due to OS Provisioning timeout.
Workaround:
Pre-requisite for this is accelerated networking which is supported on CentOS 7.4 or later. Currently BIG-IP uses CentOS 7.3
1100249-6 : SNAT with FLOW_INIT firewall rule may core TMM due to wrong type of underlying flow structure
Links to More Info: BT1100249
Component: Local Traffic Manager
Symptoms:
Tmm crashes with SIGSEGV while passing firewall traffic.
Conditions:
-- SNAT + firewall rule
-- FLOW_INIT used in an iRule
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1093717-6 : BGP4 SNMP traps are not working.
Links to More Info: BT1093717
Component: TMOS
Symptoms:
BGP4 SNMP traps are not working.
Conditions:
--Perform any BGP related event and check for snmp traps.
Impact:
No BGP SNMP traps.
Workaround:
None
1091785-7 : DBDaemon restarts unexpectedly and/or fails to restart under heavy load
Links to More Info: BT1091785
Component: Local Traffic Manager
Symptoms:
While under heavy load, the Database monitor daemon (DBDaemon) may:
- Restart for no apparent reason
- Restart repeatedly in rapid succession
- Log the following error while attempting to restart:
java.net.BindException: Address already in use (Bind failed)
- Fail to start (remain down) after several attempts, leaving database monitors disabled and marking monitored resources Down.
Conditions:
- One or more active GTM and/or LTM database monitors are configured with short probe-timeout, interval and timeout values (for example, 2, 5, or 16 respectively).
- A large number (for example, 2,000) of GTM and/or LTM database monitor instances (combinations of above monitor and pool member) are configured.
- Active GTM and/or LTM database monitors are configured with debug yes and/or count 0.
Impact:
The DBDaemon restarts for no apparent reason.
The DBDaemon fails to start (remain down) after several attempts, leaving database monitors disabled and marking monitored resources Down.
Workaround:
The conditions that are suspected to cause these symptoms include effects of ID1025089. This issue has not been confirmed to occur on BIG-IP versions which include a fix for ID1025089. On other versions, measures to prevent or reduce occurrences of ID1025089 (by reducing database monitor workload) are expected to also prevent or reduce occurrences of these symptoms.
If the DBDaemon fails to restart, the following steps may allow DBDaemon to restart successfully upon the next database monitor probe:
-- Check for a running instance of DBDaemon with the following command:
ps ax | grep -v grep | grep DBDaemon
-- If DBDaemon is running, this command will return a set of parameters including the numerical process ID (PID) at the beginning of the line and a command line that begins with "/usr/lib/jvm/jre/bin/java" and includes the parameter "com.f5.eav.DBDaemon", such as:
24943 ? Ssl 46:49 /usr/lib/jvm/jre/bin/java -cp /usr/lib/jvm/jre/lib/rt.jar:/usr/lib/jvm/jre/lib/charsets.jar:/usr/share/monitors/postgresql-jdbc.jar:/usr/share/monitors/DB_monitor.jar:/usr/share/monitors/log4j.jar:/usr/share/monitors/mssql-jdbc.jar:/usr/share/monitors/mysql-connector-java.jar:/usr/share/monitors/ojdbc6.jar -Xmx512m -Xms64m -XX:-UseLargePages -DLogFilePath=/var/log/DBDaemon-0.log com.f5.eav.DBDaemon 1521 24943 0
-- If a running DBDaemon process is identified, use the "kill" command to terminate the running DBDaemon process:
kill #
(where # is the DBDaemon PID from the above "ps" command)
-- Repeat the above "ps" command to confirm that the DBDaemon process has been terminated. If a new DBDaemon process has not been started (with a different PID), proceed to the next steps.
-- Check the /var/run directory for the presence of any files with names beginning with "DBDaemon", such as:
/var/run/DBDaemon-0.lock
/var/run/DBDaemon-0.pid
/var/run/DBDaemon-0.start.lock
Note: The numeric value in the above example filenames corresponds to the Route Domain of pool members monitored by database monitors. If the database monitors are only applied to pool members in the default route domain (RD 0), that value will be "0" as seen above. If database monitors are applied to pool members in a non-default route domain (RD 7, for example), the numeric value will correspond to that route domain, such as:
/var/run/DBDaemon-7.lock
/var/run/DBDaemon-7.pid
/var/run/DBDaemon-7.start.lock
-- If no DBDaemon process is running, delete any /var/run/DBDaemon* files. It is especially important to delete:
/var/run/DBDaemon-#.start.lock (indicates DBDaemon restart is in progress and that no further restart actions should be attempted)
/var/run/DBDaemon-#.pid (indicates current DBDaemon PID)
-- If the above actions do not result in DBDaemon restarting upon the next database monitor ping, then a complete BIG-IP restart will likely be required to recover from unknown conditions within the Java subsystem that may prevent successful DBDaemon operation:
bigstart restart
or:
reboot
1091021-7 : The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.
Links to More Info: BT1091021
Component: Local Traffic Manager
Symptoms:
You may observe LTM monitors malfunctioning on your system. For instance, you may notice some probes are not sent out on the network, and some monitored objects are showing the wrong status.
Conditions:
-- The bigd daemon consists of multiple processes (which you can determine by running "ps aux | grep bigd").
-- One or more of the processes (but not all of them) become disrupted for some reason and stop serving heartbeats to the sod daemon.
Under these conditions, sod will not take any fail-safe action and the affected bigd processes will continue running impaired, potentially indefinitely.
Impact:
LTM monitoring is impacted.
Workaround:
If you suspect this issue is occurring in your system, you can resolve it by killing all bigd processes using the following command:
pgrep -f 'bigd\.[0-9]+' | xargs kill -9
However, this does not prevent the issue from manifesting again in the future if the cause for bigd's disruption occurs again.
Monitoring may become further disrupted as bigd restarts, and a failover may occur depending on your specific configuration.
Another work around is to set only one bigd if that is possible.
modify sys db bigd.numprocs value 1
If only a single bigd is available, sod will detect when it is down.
1089625-3 : Java core dump with SIGABRT while high cpu load in BIG-IP
Links to More Info: BT1089625
Component: TMOS
Symptoms:
Observe the logs in /var/log/daemon.log
Nov 8 01:13:27 localhost.localdomain emerg logger[6270]: Re-starting restjavad
Java core generated in folder /var/core.
Conditions:
1. Provision ASM
2. Huge number of requests to restjavad
3. cpu is hitting 100%
Impact:
Restjavad will be restarted.
Workaround:
More heap memory can reduce cpu consuming operations, fewer GC cycles, less frequent minor GCs, overall less overhead for memory management can add for less cpu usage.
Please increase the value of provision.extramb and provision.restjavad.extramb by 200MB at a time ( 400, 600, 800 ...) till the issue resolves. Since changing the value of provision.extramb is service affecting you may want to start with a higher value so there is more room to experiment to find a good value for restjavad heap size. Note 500MB is equivalent to large management provisioning and 200MB is the same as medium management provisioning.
NB provision.extramb value doesn't sync between peers (by design) and must be changed on each peer, one at a time, and is service affecting when changed on active. On ASM provisioned system it can take approximately 15 minutes for system to reprovision.
tmsh modify sys db provision.extramb value 200 ( 400, 600, 800 ...)
tmsh modify sys db provision.restjavad.extramb value 600 (800, 1000, 1200 ...
bigstart restart restjavad
Increase timeout
# tmsh modify sys db icrd.timeout value 300
# tmsh modify sys db restjavad.timeout value 300
# tmsh modify sys db restnoded.timeout value 300
bigstart restart restjavad restnoded
1083405-7 : "Error connecting to named socket" from zrd
Links to More Info: BT1083405
Component: Global Traffic Manager (DNS)
Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:
err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.
Conditions:
After an mcpd restart
Impact:
Looking up or modifying zone records may fail.
Workaround:
Restart zrd and named
tmsh restart sys service zrd named
1074285-4 : Apmd crashes while handling JWT tokens.
Links to More Info: BT1074285
Component: Access Policy Manager
Symptoms:
An apmd crash mightoccur while handling JWT tokens.
Conditions:
The payload has invalid JSON during authentication.
Impact:
BIG-IP authorization disrupted while apmd restarts.
Workaround:
N/A
1073897-5 : TMM core due to memory corruption
Links to More Info: BT1073897
Component: Local Traffic Manager
Symptoms:
Tmm restarts
Conditions:
Unknown
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1040277-8 : Syslog-ng issue may cause logging to stop and possible reboot of a system
Links to More Info: BT1040277
Component: TMOS
Symptoms:
A syslog-ng issue with remote logging to an invalid remote syslog server may lead to logging via syslog-ng to stop, even locally. CPU use of syslog-ng may increase.
For software version 13.1 only it may lead to BIG-IP unexpectedly rebooting due to host watchdog timeout, typically within hours to a day or two after syslog-ng gets hung up.
The cessation of logging happens at the time of the last 'Syslog connection broken' in /var/log/messages before reboot.
That message will appear without a preceding 'Syslog connection established' just before it with same timestamp.
At this time syslog-ng typically spins, using near 100% CPU.
Conditions:
Invalid syslog-ng server configuration or broken connection from BIG-IP toward configured syslog-ng remote server.
A server is configured as a remote syslog destination on the BIG-IP, but it or an intervening system responds to stream of log messages by breaking connection eg by sending ICMP port unreachable to BIG-IP.
Syslog-ng will note the connection attempt and that it has broken usually in the same second, and do so every 60s when it retries.
There may be many of these log pairs, repeating every minute in /var/log/messages, such as:
Nov 25 03:14:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection established; fd='14', server='AF_INET(192.168.1.1:514)', local='AF_INET(0.0.0.0:0)'
Nov 25 03:14:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection broken; fd='14', server='AF_INET(192.168.1.1:514)', time_reopen='60'
The final log reports 'connection broken', usually one minute after the last established/broken pair in the very rare event that syslog-ng hangs.
Nov 25 03:15:01 localhost.localdomain notice syslog-ng[12452]: Syslog connection broken; fd='14', server='AF_INET(192.168.1.1:514)', time_reopen='60'
Impact:
Very rarely syslog-ng hangs in a non-functional state. Sometimes, this may lead to an unexpected reboot of BIG-IP. Loss of logs before restart and traffic disrupted while BIG-IP restarts.
Even if it does not reboot the loss of logging functionality can cause some daemons to block while logging and thus interrupt service.
Workaround:
Ensure syslog-ng server configuration is valid, and that the server is reachable. If a remote server is not reachable remove it from the BIG-IP syslog configuration.
If the system has encountered this issue it's important that syslog-ng is restarted if that (or equivalent such as reboot) hasn't already occurred, to resume its normal service and reduce risk of further issues.
bigstart restart syslog-ng
1036289-1 : Signature ID not displayed in Attack Signature details
Links to More Info: BT1036289
Component: Application Security Manager
Symptoms:
Only signature name is displayed in the "Attack signature detected" violation details. The ID is not displayed in the details nor in the event log.
Conditions:
Reviewing attack signature details
Impact:
The attack signature ID is not displayed, which makes it more difficult to correlate which attack signature was encountered.
Workaround:
Click on Attack Signature Documentation to know the signature ID.
1036221-3 : "Illegal parameter value length" is reported with parsing product length.
Links to More Info: BT1036221
Component: Application Security Manager
Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.
Conditions:
A JSON parameter is encoded.
Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.
Workaround:
None
1032001-4 : Statemirror address can be configured on management network or clusterd restarting
Links to More Info: BT1032001
Component: TMOS
Symptoms:
- Able to create statemirror address on the same network as management or cluster network.
- Validation issues when attempting to remove a management address.
- Clusterd process restarts constantly.
Conditions:
- Management/cluster address set up with IPv6 and statemirror address is configured with IPv4.
Impact:
- Unable to make configuration changes to the management or cluster address until the statemirror address is removed.
- Clusterd process restarts constantly causing the blade or cluster to report as offline.
1029173-6 : MCPD fails to reply and does not log a valid message if there are problems replicating a transaction to PostgreSQL
Links to More Info: BT1029173
Component: TMOS
Symptoms:
In rare circumstances MCPD fails to reply to a request from TMSH, GUI, or any daemon, for example, SNMPD.
Following is an example error message:
Mar 29 00:03:12 bigip1 err mcpd[15865]: 01070734:3: Configuration error: MCPProcessor::processRequestNow: std::exception
If snmpd is the daemon that is impacted you might see this warning message:
warning snmpd[15561]: 010e0004:4: MCPD query response exceeding 270 seconds
Conditions:
- AFM is provisioned.
- MCPD fails to connect PostgreSQL.
Impact:
TMSH command save sys config might be hung.
SNMPD stops replying to SNMP GET requests.
Workaround:
If there are any hung TMSH commands, then quit.
If SNMPD stops responding to SNMP requests, then use the command bigstart restart snmpd to restart SNMPD.
1020881-3 : TMM crashes while passing APM traffic.
Links to More Info: BT1020881
Component: Access Policy Manager
Symptoms:
TMM crashes while passing APM traffic.
Conditions:
-- LTM + APM deployment.
-- Allow list in use.
-- iRules in use.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
#--- logout_irule starts
when HTTP_REQUEST {
if { ([string tolower [HTTP::uri]] contains "closeconnection.aspx"
|| [string tolower [HTTP::uri]] contains "signout.aspx")
&& [ACCESS::session exists -state_allow -sid [HTTP::cookie MRHSession]] } {
HTTP::respond 200 content {<html><body><h1>You are now logged out.</h1></body></html>}\
"Set-Cookie" "F5_ST=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "MRHSHint=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "F5_HT_shrinked=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "F5_fullWT=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "LastMRH_Session=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"\
"Set-Cookie" "MRHSession=deleted;expires=Thu, 01-Jan-1970 00:00:01 GMT;path=/"
ACCESS::session remove
log local0. "iRule logout triggered: Removing access session for [ACCESS::session sid]"
# disable HTTP_REQUEST events for all other iRules
event disable
}
}
#--- logout_irule ends
1012009-5 : MQTT Message Routing virtual may result in TMM crash
Links to More Info: BT1012009
Component: Local Traffic Manager
Symptoms:
The BIG-IP system provides an option to use Message Routing virtual servers for MQTT traffic. It uses a different approach to associate a client side and a server side than a standard virtual server. In some instances, a server side is incorrectly handled.
Conditions:
-- A Message Routing virtual with MQTT protocol.
-- A client attempts to reconnect.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1009161-5 : SSL mirroring protect for null sessions
Links to More Info: BT1009161
Component: Local Traffic Manager
Symptoms:
Possible tmm crash during ssl handshake with connection mirroring enabled.
Conditions:
14.1 after changes applied for ID760406 and ssl handshake dropped during ssl handshake session state.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable connection mirroring
1004953-7 : HTTP does not fall back to HTTP/1.1★
Links to More Info: BT1004953
Component: Local Traffic Manager
Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.
Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).
Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.
Workaround:
None.
★ This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade
For additional support resources and technical documentation, see:
- The F5 Technical Support website: http://www.f5.com/support/
- The MyF5 website: https://my.f5.com/manage/s/
- The F5 DevCentral website: http://community.f5.com/