<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4031351#M454113</link>
    <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp; - to put this in perspective, when you say "generic failure", does that mean that this type of "error" is reported when there is some Layer1 issue on the wireless (e.g. frames that got lost and not re-transmitted, or client goes out of range, or AP has some bug, etc. ) ?&amp;nbsp; It seems that the ISE errors seen are a result of something that is a bit harder to track down.&amp;nbsp; It requires a wireless sniffer trace, logs from WLC and logs from ISE - and then someone to make sense of it all ... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Feb 2020 06:02:12 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2020-02-18T06:02:12Z</dc:date>
    <item>
      <title>ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4025362#M454053</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE 2.2 patch 8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone seen this before? It's happening for EAP-&lt;STRONG&gt;PEAP&lt;/STRONG&gt; &lt;STRONG&gt;Wireless&lt;/STRONG&gt; authentications (Cisco 8510 Flex 8.3.143.0).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The majority of the time the clients are working and then other times the same client reports failed auth.&amp;nbsp; The wireless client is still running the same code and with the same config. Not sure what triggers this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would be nice to know WHAT EXACTLY (and at what stage of the processing) is causing ISE to report this exact error - e.g. is it bad code in the client?? We see a lot of this with a particular wireless device:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="buffer.PNG" style="width: 678px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66762iC90E3E0A0849B626/image-size/large?v=v2&amp;amp;px=999" role="button" title="buffer.PNG" alt="buffer.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my experience we see other errors when wireless clients "drop off the wifi" during an EAP negotiation - we then usually see re-tries and this error - this would tell me that the client was interrupted during an EAP negotiation.&lt;/P&gt;
&lt;PRE&gt;12916 Expected TLS acknowledge for TLS fragment but received another message&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 02:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4025362#M454053</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-02-07T02:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4031329#M454059</link>
      <description>&lt;P&gt;I believe this a generic failure.&lt;/P&gt;
&lt;P&gt;For example, I found logs like below and that indicated a problem in extracting the challenge-response.&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;12104 Extracted EAP-Response containing EAP-FAST challenge-response&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;12814 Prepared TLS Alert message&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;12852 Cryptographic processing of received buffer failed&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;11504 Prepared EAP-Failure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;11003 Returned RADIUS Access-Reject&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 04:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4031329#M454059</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-02-18T04:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4031351#M454113</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp; - to put this in perspective, when you say "generic failure", does that mean that this type of "error" is reported when there is some Layer1 issue on the wireless (e.g. frames that got lost and not re-transmitted, or client goes out of range, or AP has some bug, etc. ) ?&amp;nbsp; It seems that the ISE errors seen are a result of something that is a bit harder to track down.&amp;nbsp; It requires a wireless sniffer trace, logs from WLC and logs from ISE - and then someone to make sense of it all ... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 06:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4031351#M454113</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-02-18T06:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4305934#M566074</link>
      <description>&lt;P&gt;We are experiencing the same issues with Android devices that stoped supporting self-sign certificates in the latest version.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Mar 2021 20:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4305934#M566074</guid>
      <dc:creator>Maxim Risman</dc:creator>
      <dc:date>2021-03-11T20:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4306055#M566078</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;when you generate a &lt;STRONG&gt;Report&lt;/STRONG&gt; of &lt;STRONG&gt;Top N Authentication by Failure Reason&lt;/STRONG&gt;, this &lt;STRONG&gt;12852&lt;/STRONG&gt; failure is something that happens in a specific &lt;STRONG&gt;Time Range&lt;/STRONG&gt; or &lt;STRONG&gt;Group&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 02:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4306055#M566078</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-03-12T02:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4306922#M566114</link>
      <description>&lt;P&gt;The issue described is usually seen when a protocol version is proposed by a client and not supported by the server.&lt;/P&gt;
&lt;P&gt;- Validate if any TLS version is unchecked on ISE.&lt;BR /&gt;- Verify the allowed protocols and try to enable the option "Allow weak ciphers for EAP", in case the endpoints are trying to use legacy ciphers.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Mar 2021 02:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4306922#M566114</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2021-03-14T02:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4307155#M566130</link>
      <description>&lt;P&gt;Hi Marcelo - the issue was reported too long ago - I don't recall what the final outcome was - probably an ISE upgrade.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Mar 2021 21:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4307155#M566130</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-03-14T21:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - caused by what?</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4411323#M567636</link>
      <description>&lt;P&gt;Annoying thing, I am dealing with it now, Android running devices - Zebra Scanner.&lt;/P&gt;&lt;P&gt;It looks also reproducible if a CoA reauth and session terminate has been triggered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following events are logged for the same deivce:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Failure Reason: 12916 Expected TLS acknowledge for TLS fragment but received another message&lt;BR /&gt;Resolution: Verify that the client's supplicant does not have any known compatibility issues and that it is properly configured.&lt;BR /&gt;Root cause: ISE recently has sent another TLS fragment to the supplicant and expected TLS acknowledge from supplicant to confirm the fragment before sending it the next one but received another message. This could be due to improper supplicant configuration or a possible incomformity in the implementation of the protocol between ISE and the supplicant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Event 5400 Authentication failed&lt;BR /&gt;Failure Reason 12852 Cryptographic processing of received buffer failed&lt;BR /&gt;Resolution Verify that the client's supplicant does not have any known compatibility issues and that it is properly configured. Contact TAC.&lt;BR /&gt;Root cause: ISE received invalid encrypted buffer from client. Cryptographic processing of this buffer failed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Event: 5440 Endpoint abandoned EAP session and started new&lt;BR /&gt;Failure Reason: 5440 Endpoint abandoned EAP session and started new&lt;BR /&gt;Resolution: Verify known NAD or supplicant issues and published bugs. Verify NAD and supplicant configuration.&lt;BR /&gt;Root cause: Endpoint started new authentication while previous is still in progress. Most probable that supplicant on that endpoint stopped conducting the previous authentication and started the new one. Closing the previous authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example log for&lt;/P&gt;&lt;P&gt;5440 Endpoint abandoned EAP session and started new&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session&lt;BR /&gt;15049 Evaluating Policy Group&lt;BR /&gt;15008 Evaluating Service Selection Policy&lt;BR /&gt;15048 Queried PIP - DEVICE.Device Type&lt;BR /&gt;15048 Queried PIP - Radius.Called-Station-ID&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType&lt;BR /&gt;15048 Queried PIP - Radius.NAS-Identifier&lt;BR /&gt;11507 Extracted EAP-Response/Identity&lt;BR /&gt;12300 Prepared EAP-Request proposing PEAP with challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12302 Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated&lt;BR /&gt;12319 Successfully negotiated PEAP version 1&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started&lt;BR /&gt;12805 Extracted TLS ClientHello message&lt;BR /&gt;12806 Prepared TLS ServerHello message&lt;BR /&gt;12807 Prepared TLS Certificate message&lt;BR /&gt;12808 Prepared TLS ServerKeyExchange message&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12811 Extracted TLS Certificate message containing client certificate&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;/P&gt;&lt;P&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12319 Successfully negotiated PEAP version 1&lt;BR /&gt;12812 Extracted TLS ClientKeyExchange message&lt;BR /&gt;12813 Extracted TLS CertificateVerify message&lt;BR /&gt;12804 Extracted TLS Finished message&lt;BR /&gt;12801 Prepared TLS ChangeCipherSpec message&lt;BR /&gt;12802 Prepared TLS Finished message&lt;BR /&gt;12816 TLS handshake succeeded&lt;BR /&gt;12310 PEAP full handshake finished successfully&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12313 PEAP inner method started&lt;BR /&gt;11521 Prepared EAP-Request/Identity for inner EAP method&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;5440 Endpoint abandoned EAP session and started new ( [step latency=4781 ms] Step latency=4781 ms)&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jun 2021 09:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4411323#M567636</guid>
      <dc:creator>rene_braun</dc:creator>
      <dc:date>2021-06-01T09:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 12852  Cryptographic processing of received buffer failed - ca</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4496695#M570795</link>
      <description>&lt;P&gt;have u been able to win?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 16:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-12852-cryptographic-processing-of-received-buffer-failed/m-p/4496695#M570795</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-11-02T16:55:17Z</dc:date>
    </item>
  </channel>
</rss>

