cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
9060
Views
1
Helpful
36
Replies

MRA login over Expressway-E is failing

yare
Level 1
Level 1

I setup a expressway C and E, I am trying to Login a MRA over expressway E and C but receiving this message from 

Collaboration Solutions Analyzer, SRV Checker
 
MRA login over Expressway-E xx.xxx.xxx.xxx will fail because neither the top level domain xxxxx.co.uk nor the subdomain collab-edge.xxxxx.co.uk is found in the SSL certificate SAN field.
Action plan
Create an SSL certificate with either the top level domain xxxxxx.co.uk or the subdomain collab-edge.xxxxxx.co.uk in the SAN field and upload it to the Expressway-E xx.xxx.xxx.xxx.
 
yare_0-1683799970580.png

 

36 Replies 36

yare
Level 1
Level 1

I believe this is the issue:

defectTraffic Server Enforces Certificate Validation of UCM/IM&P/Unity nodes for MRA services [CSCwc69661]MRA
Related documentation
 
Related defect(s)
Description

The tomcat(-ECDSA) certificate of the following CUCM / IM&P / Unity nodes is not trusted by the Expressway-C: imp.xxxxxx.co.uk, cucmsub01.xxxxxxx.co.uk, cucmpub.xxxxxx.co.uk. This leads to MRA login issues.

Condition

Expressway-C X14.2 and higher versions running MRA services are affected.

Further information
Starting with version X14.2 and higher (due to CSCwc69661), the Expressway-C traffic server will do a TLS certificate check on the CUCM / IM&P / Unity tomcat(-ECDSA) certificates irrespective of the configuration of TLS Verify Mode set when discovering each of those servers.

If you read the documentation for this release, in the release notes if I’m not mistaken, there is a section on this topic. You can change the behaviour of this if you don’t want to use EC signed certificates.



Response Signature


The short term solution is to apply the workaround as documented to fallback to the previous behavior before X14.2.0. You can perform on this through the CLI on the Expressway-C server nodes with the newly introduced command:

xConfiguration EdgeConfigServer VerifyOriginServer: Off

https://www.cisco.com/c/en/us/support/docs/unified-communications/expressway/218018-troubleshoot-expressway-traffic-server-c.html

 

 

 



Response Signature


There is a way to alter the ciphers that is used, so that RSA is preferred over EC. I remember reading it in the release notes, but for the love of me I cannot find it again. That’s a better solution than to use the xconfig command.



Response Signature


Found the cipher string we ended up using on our MRA C for them to favor the RSA signed CA certificates on CM/CUC. We don't use CUPS any longer, but if we did it would apply to that as well.

ECDHE-RSA-AES256-GCM-SHA384:EECDH:EDH:HIGH:-AES256+SHA:!MEDIUM:!LOW:!3DES:!MD5:!PSK:!eNULL:!aNULL:!aDH

image.png

I also found the part in the release notes that I couldn't locate yesterday, I blame the small screen as I was trying to find it using my mobile device.

Cipher Preferences - ECDSA Cipher Preference Over RSA

ECDSA certificates are preferred over RSA.

RogerKallberg_0-1683885455053.png

 


Important

The following points lists the various upgrade path(s) that are mandatory for upgrading ciphers.

  1. When upgrading from version lower than 14.0 to 14.2, the ECDSA would be preferred. If you prefer RSA certificates over ECDSA, then prefix the cipher string with "ECDHE-RSA-AES256-GCM-SHA384:" using either Web User Interface (Maintenance > Security > Ciphers) or CLI command (xConfiguration Ciphers).

  2. When upgrading from version equal or higher than 14.0 to 14.2 or higher version, you have appended "ECDHE-RSA-AES256-GCM-SHA384:" to the default Ciphers List to prefer RSA certificates over ECDSA. If you prefer ECDSA certificates over RSA, then remove "ECDHE-RSA-AES256-GCM-SHA384:" from the cipher string using Web User Interface (Maintenance > Security > Ciphers) or CLI command (xConfiguration Ciphers).

  3. Any customer has a fresh install X14.2 image, ECDSA is being preferred. If you prefer RSA certificates over ECDSA, then prefix the cipher string with “ECDHE-RSA-AES256-GCM-SHA384:” using either Web User Interface (Maintenance > Security > Ciphers) or CLI command (xConfiguration Ciphers).

It's found in this document Cisco Expressway Release Note (X14.2.5) 



Response Signature


yare
Level 1
Level 1

Certificate issue is resolved now, thanks for all your efforts

However, this is the latest error message:

Tested UDS servers

  • cucmpub.xxxxxx.co.uk
UCM user and device configuration
Found UCM version14.0.1
The jabber-config.xml file could not be retrieved.
Successfully retrieved user configuration.
Found users full name:John Smith

You don't need a jabber-config file, for MRA to work.

And honestly, have you ever reviewed how MRA works and which steps do you need to configure it? You just tripping over "normal" failures, which wouldn't come up, if you know how to install MRA. Your "errors" are not real errors, they are configuration errors, because you don't know how MRA works and how to configure it, in my opinion. And I don't think, you shouldn't bother a help forum (where people spent their free time helping others), when you don't even know the basics. It's not a teaching platform.

@b.winter, you are probably right on that point. I have not configured MRA before, but I have read as much as I could on how to configure it. The Cisco MRA configuration guide doesn't give you a solution for the error you face when following the configuration steps.

If you know something that others may not, it's wrong to assume that everyone knows it. That's why this forum exists. However, I appreciate everyone's effort and help.

Can you let us know the issues which you currently facing  after clearing the certificate errors.  As @b.winter mentioned, jabber-config file is not required.

 



Response Signature


Still facing same login issue, even tried to apply 

xConfiguration EdgeConfigServer VerifyOriginServer: Off

If you still have the issue why have you marked your post as solved?



Response Signature


yare
Level 1
Level 1

I tried to disable TLS mode using xConfiguration EdgeConfigServer VerifyOriginServer: OFF, but after executing this command and restarting Expressway C, I am still getting the error message 'SSL Connection failed for publisher and subscriber.'"

Have you read the other suggestions made to your post. Also once again, if you still have issues it’s not good to mark the post as solved.

IMG_4272.jpeg



Response Signature


I assume you are using TLS between CUCM and Expressway, What certificate you use for CUCM ? self signed or CA signed. If CA signed, both expressway C and CUCM are signed by same CA. As a test, disable the TLS between CUCM and Expressway and use TCP.

Would you be able to share the domains which is configured for Expressway C and CUCM ? And a little more about your setup to help you.



Response Signature


yare
Level 1
Level 1

I am using one domain on both external and internal. External DNS resolves _collab-edge._tls and _sip._tcp and internal DNS resolves cisco-uds._tcp and cuplogin_tcp

CUCM(cluster publisher, subscriber and IM&P)--->Exp C---->Exp E---MRA

I've created CUCM SIP Trunk pointing toward Exp C with TCP 5060, I've also created Neighbor Zone on Exp C pointing cucm publisher with TCP 5060. I disabled the TLS between CUCM and ExpresswayC using xConfiguration EdgeConfigServer VerifyOriginServer: OFF

yare_0-1684229483599.png

yare_1-1684229518106.png

yare_2-1684229575071.png

I tried to use TLS but unfortunately as this is a lab setup, I could not change my CUCM cluster to mixed mode because my server was unable to verify smart license token. With a trail license can not change cluster mode