06-25-2019 10:49 AM
Hi all,
today I installed Patch 8 on ISE 2.4 over Patch 6. After updating to Patch 8 the Certificate (chain) configured for guest portal with Comodo RSA Domain Validation Secure Server CA certificate was not shown anymore to the client (affected Clients are different Android Devices, Windows 10 Workstations with Chrome or Opera Browser). Even testing via openssl to verify the certificate chain results in failure in the chain (openssl result: "unable to get local issuer certificate").
We did a lot of testing with different certificates (root and/or intermediate) and certificate chains (also refered: https://community.cisco.com/t5/policy-and-access/guest-portal-url-certificate-issue-ise-2-3/td-p/3403241) and tried the workaround from CSCut26025, but this did not resolve the issue.
Then we decided to rollback to Patch 6 and everything works again as expected. The certificate chain was provided/shown through the ISE again.
Did not test with Patch 7 because we directly updated from Patch 6 to 8.
Any ideas or information when Patch 9 will be available and if this is fixed again?
Thanks in advance.
Regards
06-27-2019 02:45 PM
I had the same issue this week, TAC pointed me to CSCvp75207. I added trust for certificate based admin authentication for both certs in our chain, rebooted the server (standalone lab) and my portals started sending the full chain.
This is from the 2.4 admin guide, so they added a cert feature in patch 8 that might be a side effect of.
"If you plan to use any sub-CA certificate in the certificate chain for EAP authentication or certificate-based administrator authentication, ensure that you check the Trust for client authentication and Syslog checkbox while importing all the certificates in the certificate chain up until the Root CA. Starting Cisco ISE 2.4 patch 8 and above, you can import more than one CA certificate with the same subject name. For certificate-based administrator authentication, select the checkbox Trust for certificate based admin authentication when adding a trusted certificate."
06-28-2019 12:19 AM
Thanks for your reply.
But the CSCvp75207 refers to ISE System Certificate, which are also used for EAP. In my case these are public signed certificates (i.e. Comondo) used to serve the Guest Portal.
Here I have a more insecure feeling of safety to check the boxes to "Trust for authentication within ISE" and "Trust for client authentication and Syslog" (also stated in CSCut26025), because this are public CAs, not internal).
Regards
06-28-2019 07:23 AM
ISE system certificates can be used for Admin, EAP, RADIUS DTLS, pxGrid, SAML, or Portal. Portal includes your guest portal certificate, it is a system certificate. Even if it is publicly signed.
06-28-2019 08:46 AM - edited 06-28-2019 09:05 AM
My initial discussion/post was just about the guest portal, where the chain is not provided through ISE with public signed certificate(s).
For visitors/third parties people not belonging to the company the guest portal should (is) configured with an public trusted certificate. To allow a public certificate to be allowed for client auth, syslog, and so on is not common or secure I think.
With internal system certificates (used for company own/internal portals) where you have the "issue", the provided solutions/workarounds would be fine, but not to use for public ones.
Edit: or did I misunderstood something?
Regards
06-28-2019 10:23 AM
07-01-2019 12:44 AM
Thank you very much for your answer. I agree with you and you describe it very well.
Unfortunately the given workaround did not work for me. Possibly this is also related to the issuer 🤷♂️(and is treated differently by ISE).
But I think the behavior should be changed or corrected by Cisco, because I find this quite confusing (and give me security concerns).
Selecting the boxes for auth within ise, client auth and syslog, and admin based auth or interception or "correcting" by the policy should not be the goal.
..."we could debate security implications all day"....agree totally ;-)
Regards
07-01-2019 07:14 AM
Did you also check via openssl? i.e. .\openssl.exe s_client -showcerts -connect website.domain.name:port
I performed all steps after each other from the workaround stated in CSCut26025, with the same result.
The issue is not with Windows Clients (using either Firefox, Chrome, Edge Chromium, Chrome) or Apple iPhone for example, but with Android Devices.
Windows Devices trust the chain, even if the chain is not send properly. Android Devices gave me the same as openssl shows up: Verify return code: 21 (unable to verify the first certificate).
I tested witch certificates signed by Comodo for one webserver and the other one was with a wildcard certificate even in Version 2.6 Patch 1.
Regards
07-03-2019 03:31 AM
Patch 9 has been released. Has anyone tested this yet? Unfortunately I could not test this yet.
07-04-2019 10:21 AM - edited 07-04-2019 10:33 AM
CSCvp75207 is due to another bug fix in ISE 2.4 Patch 8 but NOT resolved in ISE 2.4 Patch 9.
However, the issue documented by CSCut26025 is not related at all to CSCvp75207.
07-17-2019 08:48 AM
Thanks for your reply. Through the circumstances we decided to wait for 2.4 Patch 10 and also in Version 2.6 for Patch 2 before installing an other Patch than Patch 6 for ISE 2.4 or ISE 2.6 without Patch ;-)
10-15-2019 02:29 PM
10-15-2019 02:30 PM
Hi,
2.4 Patch 10 has already launched. Have you test it ?
I have the same issue with comodo certificates with 2.4 patch 9.
10-16-2019 06:40 AM
10-17-2019 02:10 AM
I have updated the environment to patch 10 and tests also with openssl (see above) were successful. Now only patch 3 of version 2.6, which is also affected, is missing ;-)
Regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide