NSX Advanced Load Balancer supports use of Certificate Revocation Lists (CRLs). A CRL is a file issued by a certificate authority (CA) that lists certificates that were issued by the CA but have been revoked. When a client sends a request for an SSL connection to a virtual service, NSX Advanced Load Balancer can check the CAs and CRL(s) in the virtual service’s PKI profile to verify whether the client certificate is still valid.
The PKI profile has an option for full-chain CRL checking, Enable CRL Check. The impact of enabling or deactivating full-chain CRL is as follows:
Status of Full-Chain CRL Checking |
Description |
---|---|
Deactivated |
By default, if client certificate validation is enabled in the HTTP profile used by the virtual service, the PKI profile used by the virtual service must contain at least one CRL, a CRL issued by the CA that signed the client’s certificate. For a client to pass certificate validation, the CRL in the profile must be from the same CA that signed the certificate presented by the client, and the certificate must not be listed in the CRL as revoked. |
Enabled |
For more rigorous certificate validation, enable CRL checking in the PKI profile. In this case, NSX Advanced Load Balancer requires the PKI profile to contain a CRL for every intermediate certificate within the chain of trust for the client. For a client to pass certificate validation, the profile must contain a CRL from each intermediate CA in the chain of trust, and the certificate cannot be listed in any of the CRLs as revoked. If the profile is missing a CRL for any of the intermediate CAs, or the certificate is listed as revoked in any of those CRLs, the client’s request for an SSL session to the virtual service is denied. |
Another option in the PKI profile, Ignore Peer Chain, controls how NSX Advanced Load Balancer assembles the chain of trust for a client, specifically whether the intermediate certificates presented by the client are allowed to be used. If full-chain CRL checking is enabled, the PKI profile must contain CRLs from the signing CAs for every certificate that is used to build a given client’s chain of trust, whether the intermediate certificates are from the client or from the PKI profile.
Here is an example of a PKI profile with CRL checking enabled. This profile also contains the intermediate and root certificates that form the chain of trust for the server certificate. The profile also contains the CRLs from the issuing authorities for the server and intermediate certificates. The www.root.client.com CRL is used to verify whether certificate www.intermediate.client.com is valid. Likewise, the www.intermediate.client.com CRL is used to verify whether the “client” (leaf) certificate www.client.client.com is valid.
Enabling Full-chain CRL Checking
The following are the steps to enable full-chain CRL checking:
Navigate
.Click Create.
Select Enable CRL Check.
If creating a new profile specify a name and add the key, certificate, and CRL files. Ensure the profile contains a CRL for each intermediate CA in the chain of trust.
Click Save.