<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I know this is an old thread in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/eap-tls-w-freeradius-failing-phone-doesn-t-present-client/m-p/1932768#M221950</link>
    <description>&lt;P&gt;I know this is an old thread but I just had the same behavior as OP with freeRadius 3.0.9 and 8845 phones running 10.3.16 on a 10.5 cluster so... still relevant.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I found the following in the phone console logs:&lt;/P&gt;
&lt;P&gt;5840 ERR Nov 14 23:25:51.242806 PAE: -Total fragmented length(1616) doesn't match expected length(1612)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was able to resolve the problem by adding &amp;nbsp;include_length = no in mods-available/eap file under the tls section.&lt;/P&gt;</description>
    <pubDate>Sun, 15 Nov 2015 08:32:07 GMT</pubDate>
    <dc:creator>Cliff Campbell</dc:creator>
    <dc:date>2015-11-15T08:32:07Z</dc:date>
    <item>
      <title>EAP-TLS w/freeradius failing. Phone doesn't present Client certificate.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-w-freeradius-failing-phone-doesn-t-present-client/m-p/1932767#M221915</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm currently on the first phases of deploying a Cisco IPT 802.1X based proof of concept using freeradius, Cisco switching infrastructure (4500's).&lt;/P&gt;&lt;P&gt;The requirements are to use EAP-TLS authentication for the phones, and freeradius as Radius Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While trying out the concept in lab using an ISE Radius server, the configuration was straightforward and I did manage to authenticate IP phones using their MIC certificates to the ISE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Going to actual testing with freeradius, EAP-TLS authentication keeps looping, the phones keep sending RADIUS Access requests, but not being rejected or allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What was done:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- set up freeradius with EAP-TLS configuration, trusting both cisco CA root&amp;nbsp; and manufacturing root.&lt;/P&gt;&lt;P&gt;- freeradius has a server certificate generated by Thawte SSL CA certificate, where EKU fields are properly set for server authentication (and also client authentication)&lt;/P&gt;&lt;P&gt;- Phone had 802.1X enabled (and it does support EAP-TLS, as verified with the ISE test)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I can see while running a wireshark trace on freeradius is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - both parties negotiate properly that they will engage in EAP-TLS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - they&amp;nbsp; start the TLS handshake&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Server sends its certificate on a Server Hello to the phone (which is meant to not validate it)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Client (phone) never sends its certificate (MIC) to the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Client restarts EAP-TLS negotiation and goes on and on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately the debugs/Captures on freeradius do not allow to verify if the server certificate exchange is finished, or if it is failing somewhere (like a fragment being dropped).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have an idea on what might be happening? I find it very strange that the phone, on a freeradius deployment, would behave differently than one on a ISE deployment, especially because it doesn't validate the server certificate, so it shouldn't matter what is presented to the phone.&lt;/P&gt;&lt;P&gt;Phone firmware is 9.2(3) and callmanager 8.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gustavo Novais&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-w-freeradius-failing-phone-doesn-t-present-client/m-p/1932767#M221915</guid>
      <dc:creator>Gustavo Novais</dc:creator>
      <dc:date>2019-03-11T01:55:12Z</dc:date>
    </item>
    <item>
      <title>I know this is an old thread</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-w-freeradius-failing-phone-doesn-t-present-client/m-p/1932768#M221950</link>
      <description>&lt;P&gt;I know this is an old thread but I just had the same behavior as OP with freeRadius 3.0.9 and 8845 phones running 10.3.16 on a 10.5 cluster so... still relevant.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I found the following in the phone console logs:&lt;/P&gt;
&lt;P&gt;5840 ERR Nov 14 23:25:51.242806 PAE: -Total fragmented length(1616) doesn't match expected length(1612)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was able to resolve the problem by adding &amp;nbsp;include_length = no in mods-available/eap file under the tls section.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Nov 2015 08:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-w-freeradius-failing-phone-doesn-t-present-client/m-p/1932768#M221950</guid>
      <dc:creator>Cliff Campbell</dc:creator>
      <dc:date>2015-11-15T08:32:07Z</dc:date>
    </item>
  </channel>
</rss>

