With default SSL template, AX or Thunder device configured with SSL offload on software releases 2.7.2-P3 patch code train may experience high data CPU utilization or SSL handshake failures under minimal SSL traffic load. In addition, SSL connections may fail intermittently if GCM ciphers are used for negotiation (Bug ID: 221545).
AX or Thunder devices contain PX and/or Nitrox III SSL Cards
SLB code train: 2.7.2-P3, 2.7.2-P3-SP3
Any client using DHE ciphers or ECDHE ciphers with ec-names not offloaded in hardware will result in high CPU usage because traffic is forced to be processed by data CPUs.
Nitrox III SSL card only offers hardware support for two Elliptical Curve, ec-name secp256r1 and secp384r1, which must be explicitly configured in the client SSL template to take advantage of hardware offload. Hardware offload for DHE ciphers on Nitrox III card has not been implemented but will be available in future software releases. For server side SSL, only handshakes for RSA ciphers are offloaded to hardware. DHE/ECDHE ciphers are processed by data CPUs.
The software defect 221545, which affects both Nitrox III and PX cards and causes SSL handshake failure due to GCM ciphers, will be addressed in 2.7.2-P4.
TH1030S#show hardware Thunder Series Unified Application Service Gateway TH1030S Serial No : TH10A53313390024 CPU : Intel(R) Xeon(R) CPU 8 cores 9 stepping Storage : Single 74G drive Memory : Total System Memory 8150 Mbyte, Free Memory 2873 Mbyte SMBIOS : Build Version: 4.6.5 Release Date: 07/24/2013 SSL Cards : 1 device(s) present 1 Nitrox III GZIP : 0 compression device(s) present FPGA : 0 instance(s) present L2/3 ASIC : 0 device(s) present IPMI : Present Ports : 10
Configure specific ciphers supported by PX or Nitrox III SSL cards in the SSL templates. Following are recommended client or server SSL templates that can be configured to avoid potential issues due to lack of hardware support for some Elliptical Curve ciphers in current software releases.
slb template client-ssl clientssl cert cert key key cipher TLS1_RSA_EXPORT1024_RC4_56_MD5 cipher TLS1_RSA_EXPORT1024_RC4_56_SHA cipher SSL3_RSA_RC4_40_MD5 cipher SSL3_RSA_RC4_128_MD5 cipher SSL3_RSA_RC4_128_SHA cipher SSL3_RSA_DES_40_CBC_SHA cipher SSL3_RSA_DES_64_CBC_SHA cipher SSL3_RSA_DES_192_CBC3_SHA cipher TLS1_RSA_AES_128_SHA cipher TLS1_RSA_AES_256_SHA cipher TLS1_RSA_AES_128_SHA256 cipher TLS1_RSA_AES_256_SHA256
slb template client-ssl clientssl cert cert key key ec-name secp256r1 ec-name secp384r1 cipher TLS1_RSA_EXPORT1024_RC4_56_MD5 cipher TLS1_RSA_EXPORT1024_RC4_56_SHA cipher SSL3_RSA_RC4_40_MD5 cipher SSL3_RSA_RC4_128_MD5 cipher SSL3_RSA_RC4_128_SHA cipher SSL3_RSA_DES_40_CBC_SHA cipher SSL3_RSA_DES_64_CBC_SHA cipher SSL3_RSA_DES_192_CBC3_SHA cipher TLS1_RSA_AES_128_SHA cipher TLS1_RSA_AES_256_SHA cipher TLS1_ECDHE_RSA_AES_128_SHA cipher TLS1_ECDHE_RSA_AES_256_SHA cipher TLS1_ECDHE_ECDSA_AES_128_SHA cipher TLS1_ECDHE_ECDSA_AES_256_SHA cipher TLS1_RSA_AES_128_SHA256 cipher TLS1_RSA_AES_256_SHA256 cipher TLS1_ECDHE_RSA_AES_128_SHA256 cipher TLS1_ECDHE_ECDSA_AES_128_SHA256
Following server-ssl template is recommended if end-to-end SSL offload is deployed with devices with Nitrox III card. For devices with PX card, default template can be used.
slb template server-ssl serverssl cipher TLS1_RSA_EXPORT1024_RC4_56_MD5 cipher TLS1_RSA_EXPORT1024_RC4_56_SHA cipher SSL3_RSA_RC4_40_MD5 cipher SSL3_RSA_RC4_128_MD5 cipher SSL3_RSA_RC4_128_SHA cipher SSL3_RSA_DES_40_CBC_SHA cipher SSL3_RSA_DES_64_CBC_SHA cipher SSL3_RSA_DES_192_CBC3_SHA cipher TLS1_RSA_AES_128_SHA cipher TLS1_RSA_AES_256_SHA cipher TLS1_RSA_AES_128_SHA256 cipher TLS1_RSA_AES_256_SHA256
Vulnerability ID | Vulnerability Description |
---|
Ref # | General Link |
---|
Revision | Date | Description |
---|---|---|
1.0 | April 13, 2018 |
Created web page |