<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Message-Authenticator Attribute order in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205796#M592323</link>
    <description>&lt;P&gt;did so,&lt;BR /&gt;reply from Juniper:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;The recommendation for RADIUS servers is to include the Message-Authenticator attribute in all replies to Access-Request packets. The Message-Authenticator should be encoded as the first attribute in the packet, immediately after the attribute header. Note that adding a Message-Authenticator to the end of reply packets will not mitigate the attack. When the Message-Authenticator is the last attribute in a packet, the attacker can treat the Message-Authenticator as an unknown suffix, as with the shared secret. The attacker then calculates the prefix as before, and has the RADIUS server authenticate the packet which contains the prefix.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2024 14:08:17 GMT</pubDate>
    <dc:creator>tsme</dc:creator>
    <dc:date>2024-10-09T14:08:17Z</dc:date>
    <item>
      <title>ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205188#M592287</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/355565"&gt;@ll&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;today I came across an issue with Admin-authentication on a Juniper FW (&lt;SPAN&gt;&lt;SPAN class=""&gt;JUNOS 22.4R3-S4.5&lt;/SPAN&gt;&lt;/SPAN&gt;) using RADIUS..&lt;BR /&gt;I can see Authentication request coming in and also being answered successfully with Access-Accept.&lt;BR /&gt;Unfortunately the FW refuses to let me in:&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;sshd: PAM_RADIUS_SEND_REQ_FAIL: Sending radius request failed with error (No valid RADIUS responses received).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;After searching and debugging I came across this support articles from Juniper for specified JUNOS Version:&lt;BR /&gt;&lt;A href="https://supportportal.juniper.net/s/article/RADIUS-authentication-not-working-on-23-4R2-S2" target="_blank" rel="noopener"&gt;Article ID KB86815&lt;/A&gt; (account required)&lt;BR /&gt;&lt;A href="https://supportportal.juniper.net/s/article/Latest-Junos-version-to-avoid-the-RADIUS-authentication-issue-security-enhancement" target="_self"&gt;Article ID KB87923&lt;/A&gt; (account required)&lt;BR /&gt;saying: &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;The Message-Authenticator is not encoded as the first attribute in the response packet, immediately after the attribute header.&lt;BR /&gt;&lt;SPAN&gt;For now, the workaround would be on server-side.&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Anybody aware of changing/manipulating AVP orders in response packets on ISE, and putting "Message-Authenticator" on first place? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 13:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205188#M592287</guid>
      <dc:creator>tsme</dc:creator>
      <dc:date>2024-10-08T13:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205206#M592288</link>
      <description>&lt;P&gt;You use radius or tacacs for admin?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 14:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205206#M592288</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-08T14:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205590#M592307</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I stated in my post that I receive the error using RADIUS&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Oct&amp;nbsp;7 16:43:01&amp;nbsp;fw-name-obfuscated sshd[26120]: Message-Authenticator is not encoded as the first attribute in the response packet, immediately after the attribute header.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 Oct 2024 07:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205590#M592307</guid>
      <dc:creator>tsme</dc:creator>
      <dc:date>2024-10-09T07:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205593#M592308</link>
      <description>&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Cisco ISE: under the Allowed Protocol configurations, enable 'Require Message-Authenticator for all RADIUS Requests' (ref from the Cisco ISE:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/222287-blast-radius-cve-2024-3596-protocol-sp.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Blast-RADIUS (CVE-2024-3596) Protocol Spoofing Mitigation - Cisco&lt;/A&gt;).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;check above&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 08:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205593#M592308</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-09T08:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205631#M592312</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;the impact of activating this "feature" would exclude NADs which do not support/send the Message-Authenticator (MA).&lt;BR /&gt;I've allready checked by TCP Dumps that:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;if a NAD is sending MA, ISE responses also with a MA&lt;/LI&gt;&lt;LI&gt;NAD auth requests without MA, are answered without MA by ISE&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So basically enabling this would have an impact on devices not sending the MA in RADIUS AVP, but not changing the order.&lt;BR /&gt;&lt;BR /&gt;Your suggestion would not solve the order issue:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2024-10-08_radius_Message-Authenticator_Junos_22.4R3-S4.5.pcap.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230906iB84D363411B6BEE5/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-10-08_radius_Message-Authenticator_Junos_22.4R3-S4.5.pcap.png" alt="2024-10-08_radius_Message-Authenticator_Junos_22.4R3-S4.5.pcap.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 08:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205631#M592312</guid>
      <dc:creator>tsme</dc:creator>
      <dc:date>2024-10-09T08:43:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205686#M592316</link>
      <description>&lt;P&gt;Can you contact Juniper it can bug&amp;nbsp;&lt;BR /&gt;the ISE sure send message-authc in access-accept&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;update me if you get reply from Juniper&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 10:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205686#M592316</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-09T10:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205796#M592323</link>
      <description>&lt;P&gt;did so,&lt;BR /&gt;reply from Juniper:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;The recommendation for RADIUS servers is to include the Message-Authenticator attribute in all replies to Access-Request packets. The Message-Authenticator should be encoded as the first attribute in the packet, immediately after the attribute header. Note that adding a Message-Authenticator to the end of reply packets will not mitigate the attack. When the Message-Authenticator is the last attribute in a packet, the attacker can treat the Message-Authenticator as an unknown suffix, as with the shared secret. The attacker then calculates the prefix as before, and has the RADIUS server authenticate the packet which contains the prefix.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 14:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205796#M592323</guid>
      <dc:creator>tsme</dc:creator>
      <dc:date>2024-10-09T14:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205901#M592332</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/222287-blast-radius-cve-2024-3596-protocol-sp.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/222287-blast-radius-cve-2024-3596-protocol-sp.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;But this doc. Show that attribute is first in order.&lt;/P&gt;
&lt;P&gt;So either there is hacker man in middle change modify some data or ISE patch need to upgrade.&lt;/P&gt;
&lt;P&gt;Can you open TAC sure they will suggest correct ISE ver.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks alot&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2024 16:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5205901#M592332</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-10-09T16:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5206451#M592356</link>
      <description>&lt;P&gt;sorry for asking that, but where exactly did you read that (MA is first in order, sent by ISE) in the Mitigation Document mentioned?&lt;BR /&gt;Have read it several times and must have missed it.&lt;BR /&gt;&lt;BR /&gt;I'm indeed already in conversation witth TAC.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2024 11:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5206451#M592356</guid>
      <dc:creator>tsme</dc:creator>
      <dc:date>2024-10-10T11:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5210992#M592539</link>
      <description>&lt;P&gt;Did you work it out with TAC? I have the same problem&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 08:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5210992#M592539</guid>
      <dc:creator>jkhgfdsa</dc:creator>
      <dc:date>2024-10-18T08:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5216077#M592706</link>
      <description>&lt;P&gt;I'm still in contact with TAC, Cisco is evaluating if this could be developed as a feature but currently it is not possible to alter the position of MA in the answer packets.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 10:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5216077#M592706</guid>
      <dc:creator>tsme</dc:creator>
      <dc:date>2024-10-28T10:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5216101#M592709</link>
      <description>&lt;P&gt;I also have a case with them right now. With Windows NPS server it looks like this and works:&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NPS.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/232539iB6FB46E326AEDC6C/image-size/large?v=v2&amp;amp;px=999" role="button" title="NPS.png" alt="NPS.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 10:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5216101#M592709</guid>
      <dc:creator>jkhgfdsa</dc:creator>
      <dc:date>2024-10-28T10:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5248200#M594264</link>
      <description>&lt;P&gt;After enabling Message authenticator for all radius request, is there any action required for radius Client let's say client like WLC ?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 17:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5248200#M594264</guid>
      <dc:creator>ndahemmy</dc:creator>
      <dc:date>2025-01-16T17:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5249958#M594343</link>
      <description>&lt;P&gt;Just to close the query. In RFC there is not strict recommendation to put Message-Authenticator as the first attribute in the response packet. The issue has been addressed in Junos 22.4R3-S5.11 which no longer checks if the MA is the first attribute in the response packet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 07:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5249958#M594343</guid>
      <dc:creator>Michal Janowski</dc:creator>
      <dc:date>2025-01-21T07:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Message-Authenticator Attribute order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5249970#M594345</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am running&amp;nbsp;23.4R2-S2.1 and its not fixed on that version.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 08:20:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-message-authenticator-attribute-order/m-p/5249970#M594345</guid>
      <dc:creator>jkhgfdsa</dc:creator>
      <dc:date>2025-01-21T08:20:19Z</dc:date>
    </item>
  </channel>
</rss>

