<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: handshake SSL !!! in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655344#M68725</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of the reasons might be does not have an "extKeyUsage" extension of "serverAuth" (OID = 1.3.6.1.5.5.7.3.1). This extension is considered a standard for SSL servers, and is quite likely the reason for the certificate being rejected by the client.If you use openssl manually, then you would create a file (let's call it "xpextensions") with the following contents,&lt;/P&gt;&lt;P&gt;[xpclient_ext], extendedKeyUsage = 1.3.6.1.5.5.7.3.2     [xpserver_ext],extendedKeyUsage = 1.3.6.1.5.5.7.3.1 and you would include the following command-line arguments for openssl  when creating the certificate:"-extensions xpserver_ext -extfile ./xpextensions"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Sep 2006 13:37:01 GMT</pubDate>
    <dc:creator>pradeepde</dc:creator>
    <dc:date>2006-09-20T13:37:01Z</dc:date>
    <item>
      <title>handshake SSL !!!</title>
      <link>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655343#M68724</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I currently deploy a Wireless Unified Infrastructure based on Airespace Technology.&lt;/P&gt;&lt;P&gt;I provided a diagram in enclosure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to use the eap-peap authentication, based on Windows Logon/Password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Wireless Client will use an Intel Wireless Adapter (Intel Pro/Wireless 2200BG) with Intel ProSet/Wireless Supplicant (v. 10.5.0.0).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to use ACS Cisco Server to authenticate and authorize my clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I followed the documentation on ACS to use PEAP, but i have an issue in the log "Failed Attempts" :&lt;/P&gt;&lt;P&gt;--&amp;gt; "EAP-TLS or PEAP authentication failed during SSL handshake"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the logs "CSAuth" :&lt;/P&gt;&lt;P&gt;--&amp;gt; EAP: PEAP: ProcessResponse: SSL handshake failed, status = 3 (SSL recv alert fatal:bad certificate)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apparently, it's a certificate's problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I installed a certificate while using Generate Self-Signed Certificate on ACS, and I check it on "Certificate Trust List".&lt;/P&gt;&lt;P&gt;On the other hand, i don't now what CRL Distribution URL I must put on "Certificate Revocation List".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you help me, please ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ps:sorry for my english, i am french&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 20:06:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655343#M68724</guid>
      <dc:creator>benjamin.heron</dc:creator>
      <dc:date>2021-07-04T20:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: handshake SSL !!!</title>
      <link>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655344#M68725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of the reasons might be does not have an "extKeyUsage" extension of "serverAuth" (OID = 1.3.6.1.5.5.7.3.1). This extension is considered a standard for SSL servers, and is quite likely the reason for the certificate being rejected by the client.If you use openssl manually, then you would create a file (let's call it "xpextensions") with the following contents,&lt;/P&gt;&lt;P&gt;[xpclient_ext], extendedKeyUsage = 1.3.6.1.5.5.7.3.2     [xpserver_ext],extendedKeyUsage = 1.3.6.1.5.5.7.3.1 and you would include the following command-line arguments for openssl  when creating the certificate:"-extensions xpserver_ext -extfile ./xpextensions"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Sep 2006 13:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655344#M68725</guid>
      <dc:creator>pradeepde</dc:creator>
      <dc:date>2006-09-20T13:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: handshake SSL !!!</title>
      <link>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655345#M68726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just confirming do you have user cert on the laptop &lt;/P&gt;&lt;P&gt;can you get aa debgs/logs from ACS and controller &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Seema &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Sep 2006 19:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655345#M68726</guid>
      <dc:creator>segopala</dc:creator>
      <dc:date>2006-09-30T19:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: handshake SSL !!!</title>
      <link>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655346#M68727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you install the ACS certificate on the client ???&lt;/P&gt;&lt;P&gt;PEAP doesn't require client side certificates but the client must be able to "trust' the ACS server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Oct 2006 14:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655346#M68727</guid>
      <dc:creator>dsidley</dc:creator>
      <dc:date>2006-10-01T14:19:21Z</dc:date>
    </item>
    <item>
      <title>Re: handshake SSL !!!</title>
      <link>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655347#M68728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To check your setup , install self sign certificate on the ACS and uncheck the " Validate server certificate" option on your laptop ( under Windows Zero config ).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2006 04:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655347#M68728</guid>
      <dc:creator>jasjsingh</dc:creator>
      <dc:date>2006-10-04T04:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: handshake SSL !!!</title>
      <link>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655348#M68729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does anyone know how to get the user a certificate to trust the ACS? (So that the "Validate server certificate" can be checked)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Oct 2006 07:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/handshake-ssl/m-p/655348#M68729</guid>
      <dc:creator>robsimkins</dc:creator>
      <dc:date>2006-10-12T07:44:50Z</dc:date>
    </item>
  </channel>
</rss>

