Deny SSLv3 Using aFlex
When Client Attempt to Using SSLv3 Connect to VIP, Deny it.
Allow Some Client to Use SSLv3 when Needed
Requirement
Service Type: HTTPS or TCP/443(See Follow Limitation)
TCP/443 Limitation: Only Support reject, can't be respond redirect to page.
Code
when CLIENT_ACCEPTED {
# Check Remote Client IP (Remote_Addr usually means clinet IP)
if { [IP::addr [remote_addr] equals 8.8.8.0/24] } {
set sslv3pass 1
} elseif { [IP::addr [remote_addr] equals 8.8.4.0/24] } {
set sslv3pass 1
} else {
set sslv3pass 0
}
TCP::collect
}
when CLIENT_DATA {
binary scan [TCP::payload] cS rtype sslver
# log will affect unit performance, DO NOT Use it when production.
# log "$sslv3pass . $sslver"
# SSL 3.0 -> 768 TLS 1.0 -> 769 TLS 1.1 -> 770 TLS 1.2 -> 771
# TCP/443 and HTTPS
if { ( $sslv3pass == 0 ) && ( $sslver <= 768 ) } { reject }
# HTTPS only. If you want to redirect traffic, you can used follow line.
# if { ( $sslv3pass == 0 ) && ( $sslver <= 768 ) } { set red 1 }
}
#when HTTP_REQUEST {
# if {$red == 1} {
# HTTP::respond 302 Location "https://tw.gamania.com/" Cache-Control No-Cache Pragma No-Cache
# }
#}