Deny SSLv3 Using aFlex

  • When Client Attempt to Using SSLv3 Connect to VIP, Deny it.
  • Allow Some Client to Use SSLv3 when Needed

Requirement

  • Service Type: HTTPS or TCP/443(See Follow Limitation)
  • TCP/443 Limitation: Only Support reject, can't be respond redirect to page.

Code

when CLIENT_ACCEPTED {
	# Check Remote Client IP (Remote_Addr usually means clinet IP)
	if { [IP::addr [remote_addr] equals 8.8.8.0/24] } {
		set sslv3pass 1
	} elseif { [IP::addr [remote_addr] equals 8.8.4.0/24] } {
		set sslv3pass 1
	} else {
		set sslv3pass 0
	}
	TCP::collect
}
 
when CLIENT_DATA {
	binary scan [TCP::payload] cS rtype sslver

	# log will affect unit performance, DO NOT Use it when production.
#	log "$sslv3pass . $sslver"

	# SSL 3.0 -> 768 TLS 1.0 -> 769 TLS 1.1 -> 770  TLS 1.2 -> 771
	# TCP/443 and HTTPS
	if { ( $sslv3pass == 0 ) && ( $sslver <= 768 ) } { reject }

	# HTTPS only. If you want to redirect traffic, you can used follow line.
#	if { ( $sslv3pass == 0 ) && ( $sslver <= 768 ) } { set red 1 }
}

#when HTTP_REQUEST {
#	if {$red  == 1} {
#		HTTP::respond 302 Location "https://tw.gamania.com/" Cache-Control No-Cache Pragma No-Cache
#	}
#}
a10/slb/aflex/http/deny-sslv3/deny_sslv3_using_aflex.txt · 上一次變更: 2014/12/08 16:40 由 jal
上一頁 | 下一頁 | 回首頁 | RSS Feed | Facebook