03-11-2019 04:05 AM
Dear,
Something strange is happening with EAP-TLS and ISE CRL.
It's not something very common scenario our client has 2 CA as temporary solution to migrate to the new CA.
ISE is authenticating bot client certificate without any problem.
Now we are running into this strange behavior:
We did the same test if the client started with the new certificated and that is working correctly.
It seems to me that ISE is taking a shortcut and not really checking the authentication when doing a repeated authentication.
I’m still looking into this maybe it can even be used as an exploit.
Kr
Niels
Solved! Go to Solution.
03-13-2019 03:41 PM
Can you check whether ISE is enabled with session resume:
- Administration > System > Settings > Protocols > EAP-TLS > Enable EAP TLS Session Resume
- Policy > Policy Elements > Authentication > Allowed Protocols > Default Network Access (Or ones being used) > Allow EAP-TLS > Enable Stateless Session resume
06-29-2019 09:55 AM
Correct. That is one of the feature characteristics:
03-13-2019 03:41 PM
Can you check whether ISE is enabled with session resume:
- Administration > System > Settings > Protocols > EAP-TLS > Enable EAP TLS Session Resume
- Policy > Policy Elements > Authentication > Allowed Protocols > Default Network Access (Or ones being used) > Allow EAP-TLS > Enable Stateless Session resume
06-19-2019 04:38 AM
Dear,
Thanks for your responds it's indeed enabled.
Does this mean we have to disconnect long enough before reconnecting in order to let de CRL work correctly?
Kr
Niels
06-29-2019 09:55 AM
Correct. That is one of the feature characteristics:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide