<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TLS v1.2 Weak Cipher suites on PSN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5249054#M594292</link>
    <description>&lt;P&gt;You can't manage the TLS ciphers through the ISE CLI. You must do that through the GUI (please see the screenshots I posted earlier). The ISE CLI allows you to manage the SSH protocols a bit better.&lt;/P&gt;</description>
    <pubDate>Sat, 18 Jan 2025 21:18:45 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2025-01-18T21:18:45Z</dc:date>
    <item>
      <title>TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245562#M594122</link>
      <description>&lt;P&gt;Dear Cisco ISE,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Currently we have vulnerability scan within our lab and found the weak cipher suites as below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="oumodom_0-1736497400816.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237326iCC07D18ADF97B97A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="oumodom_0-1736497400816.png" alt="oumodom_0-1736497400816.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Please let us know if we are running the weak cipher suites above or not?&amp;nbsp;&lt;BR /&gt;Does ISE only use the CBC or GCM if we are running EAP-TLS and MSCHAPv2?&amp;nbsp;&lt;BR /&gt;If the supplicant is Windows 11 with Secure Client, so it automatically runs TLS v1.2?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 08:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245562#M594122</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2025-01-10T08:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245563#M594123</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1757802"&gt;@oumodom&lt;/a&gt; from ISE 3.3 you can select ciphers to enable/disable. The guide below has a list of supported ciphers and describes how to select the ciphers to use.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-33/221570-configure-ciphers-in-ise-3-3-and-later.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-33/221570-configure-ciphers-in-ise-3-3-and-later.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 08:34:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245563#M594123</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-01-10T08:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245825#M594131</link>
      <description>&lt;P&gt;Out of curiosity, what version of ISE are you using?&amp;nbsp; Are you able to configure TLS 1.3 for your test?&amp;nbsp; It appears that you can't disable TLS 1.2 though.&lt;/P&gt;
&lt;P&gt;What Security Settings are in place during your test?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1736545451368.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237351i5C1EA4B28449EFA0/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1736545451368.png" alt="ArneBier_0-1736545451368.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can also manually configure the ciphers if needed ...&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_1-1736545576950.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237352i3D5230916C5327A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_1-1736545576950.png" alt="ArneBier_1-1736545576950.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 21:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245825#M594131</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-10T21:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245833#M594132</link>
      <description>&lt;P&gt;Regarding the EAP Server component in ISE, you asked the questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Does ISE only use the CBC or GCM if we are running EAP-TLS and MSCHAPv2?&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;If the supplicant is Windows 11 with Secure Client, so it automatically runs TLS v1.2?&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;I ran a wpa_supplicant eapol_test (version 2.10) test against ISE 3.4 p1 and captured the Server Hello from ISE. By default, the eapol_test client will try TLS 1.2 during the Client-Hello (which is consistent with most OS supplicants) - and ISE responds accordingly:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_2-1736546459841.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237353i8D644CD508352E55/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_2-1736546459841.png" alt="ArneBier_2-1736546459841.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In ISE Live Logs Details pane:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_4-1736547248184.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237355i0EDEFA5BC54495BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_4-1736547248184.png" alt="ArneBier_4-1736547248184.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With eapol_test, you can force TLS versions to test the EAP server support. I did that by disabling all TLS versions except 1.3 and ISE supports it (ISE 3.4 p1) - whether Windows/iOS/MAC/SecureClient supplicants support this, is not clear to me:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_5-1736547397240.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237356iCE3C3DBFE3B29C3F/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_5-1736547397240.png" alt="ArneBier_5-1736547397240.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_3-1736546999308.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237354iE2067047CFA3546F/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_3-1736546999308.png" alt="ArneBier_3-1736546999308.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is my eapol_test config file&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;eapol_version=3
network={
         phase1="tls_disable_tlsv1_0=1 tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1 tls_disable_tlsv1_3=0"
         ssid="example"
         bssid=00:11:22:33:44:55
         proto=WPA
         key_mgmt=WPA-EAP
         eap=TLS
         identity="host/demopc.rnlab.local"
         #ca_cert="/home/abier/wpa/RNLAB-ROOTCA.pem"
         client_cert="/home/abier/wpa/demopc.cert"
         private_key="/home/abier/wpa/demopc.key"
         eapol_flags=3
}&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 22:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5245833#M594132</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-10T22:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5246326#M594142</link>
      <description>&lt;P&gt;So helpful for my inquiry&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;as our ISE LAB, running v3.1 P9.&amp;nbsp;&lt;BR /&gt;I can see mine is using &lt;STRONG&gt;TLS v1.2&lt;/STRONG&gt; with&amp;nbsp;&lt;STRONG&gt;TLSCipher ECDHE-RSA-AES256-GCM-SHA384&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;So how to list all cipher suites which cisco ise in &lt;STRONG&gt;CLI&lt;/STRONG&gt; ? and how to disable such &lt;STRONG&gt;weak cipher suites&lt;/STRONG&gt; below?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="oumodom_0-1736759806649.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237438i518EEC8EFA152FCB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="oumodom_0-1736759806649.png" alt="oumodom_0-1736759806649.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2025 09:18:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5246326#M594142</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2025-01-13T09:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5249054#M594292</link>
      <description>&lt;P&gt;You can't manage the TLS ciphers through the ISE CLI. You must do that through the GUI (please see the screenshots I posted earlier). The ISE CLI allows you to manage the SSH protocols a bit better.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2025 21:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5249054#M594292</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-18T21:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5250706#M594391</link>
      <description>&lt;P&gt;As from lab I configured, as noticed Ciphersuite depend on supplicant selective which from Client hello message, not from Cisco ISE selective.&lt;BR /&gt;&lt;BR /&gt;If so if there any standard workflow/document from cisco to be selected the best one on ciphersuite between endpoint and ISE? and any mentioned on endpoint which running secure client agent is require TLS v1.2 mandatory for cipher suite?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I raised up this idea because in case, endpoint/supplicant having hello message with weak cipher suite, there will be breakable for attacker.&lt;BR /&gt;&lt;BR /&gt;what is your idea&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp; &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&amp;nbsp;for above concern?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;please refer to figure below.&lt;BR /&gt;There are 21 cipher suites from endpoint on Client Hello.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="oumodom_1-1737520607673.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238159iDC9DD61E326AB50B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="oumodom_1-1737520607673.png" alt="oumodom_1-1737520607673.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;While Server Hello provided the highest one to endpoint on cipher.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="oumodom_2-1737520745572.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238160i23D08EF7E881CAEA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="oumodom_2-1737520745572.png" alt="oumodom_2-1737520745572.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 04:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5250706#M594391</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2025-01-22T04:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5250748#M594394</link>
      <description>&lt;P&gt;I don't know what the RFC says (maybe need to research that a bit) but it was my understanding that it's the Authenticating Server (ISE) that has the final say, after it compares the Client Hello capabilities against its own - and in the ISE code there must be some ranking that takes the best of the available ciphers. All we can do in the ISE GUI is to deselect the ones we don't want to use (even if the client supports them).&amp;nbsp; Whatever ciphers remain in the list of candidates will determine the winner - and I don't know how ISE selects - I would hope it's following some industry standard that e.g. prefers GCM over CBC etc.&lt;/P&gt;
&lt;P&gt;Are you satisfied with what you see in the Server Hello, or did you expect a different result?&lt;/P&gt;
&lt;P&gt;I don't think TLS 1.2 is susceptible to a downgrade attack.&amp;nbsp; If you want an excellent guide on TLS, you should check out the work by Ed Harmoush. He has some great videos and podcast appearances and also offers paid for training on TLS (for the ultimate TLS nerds).&amp;nbsp; Check out his talk on TLS 1.3 on this &lt;A href="https://packetpushers.net/podcasts/day-two-devops/d2do249-the-anatomy-of-tls-1-3-and-why-you-should-risk-it/" target="_self"&gt;packet pushers podcast episode&lt;/A&gt;. He would know the answer to this instantly.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 05:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5250748#M594394</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-22T05:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5250760#M594395</link>
      <description>&lt;P&gt;I have no objection on your idea and would make scenes on decision making from ise, not from endpoint.&lt;BR /&gt;What the priority/order on cipher suites is key to be documented from cisco vendor.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 06:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5250760#M594395</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2025-01-22T06:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5251198#M594416</link>
      <description>&lt;P&gt;The best we have is what's mentioned in &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/admin_guide/b_ise_admin_3_3/b_ISE_admin_33_segmentation.html#supportedciphersuites" target="_self"&gt;Admin Guide under Cipher Suites&lt;/A&gt;. But the order in selection is not mentioned. Perhaps it's obvious that 384 will be chosen over 256 etc. And also, you can elect to disable RSA and use ECDSA instead - so by constraining the ISE supported ciphers to suit your organization's needs. This of course will only work if your end devices supports what ISE supports. It looks like ISE has a very good and up to date cipher suite.&lt;/P&gt;
&lt;P&gt;Regarding the documentation, at the very top of the link I posted above, you can give Cisco direct feedback to please clarify this process&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1737579236946.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238216i75598461F9A663B2/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1737579236946.png" alt="ArneBier_0-1737579236946.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 20:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5251198#M594416</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-01-22T20:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5253778#M594581</link>
      <description>&lt;P&gt;Please note that currently this configuration not relevant for ISE as EAP server&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 14:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5253778#M594581</guid>
      <dc:creator>mbuzaglo</dc:creator>
      <dc:date>2025-01-28T14:31:16Z</dc:date>
    </item>
    <item>
      <title>Re: TLS v1.2 Weak Cipher suites on PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5254047#M594603</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1837333"&gt;@mbuzaglo&lt;/a&gt;&amp;nbsp;Could you elaborate more with your idea?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 04:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tls-v1-2-weak-cipher-suites-on-psn/m-p/5254047#M594603</guid>
      <dc:creator>oumodom</dc:creator>
      <dc:date>2025-01-29T04:54:10Z</dc:date>
    </item>
  </channel>
</rss>

