02-26-2023 04:16 PM - edited 02-27-2023 04:02 AM
According to this bug, it stated: When user authentication initiates from ISE, ISE will connect and send the encryption types that are supported (RC4, AES128, and AES256). This enhancement is for AD tuning to only send AES 256
This is exactly what I am seeing between my Cisco ISE version 3.1 patch-5 (latest patch) and Microsoft Windows Active Directory (AD). My Cisco ISE is integrated with AD for user authentication. In other words, the ISE has to communicate with AD for username and password. When I capture the traffic on the ISE, I can clearly see the ISE sent RC4 to AD and AD responded back with RC4 with the RPC_Netlogon protocol, as seen below:
Cisco ISE to AD request:
Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)
Auth type: NETLOGON Secure Channel (68)
Auth level: Packet privacy (6)
Auth pad len: 4
Auth Rsrvd: 0
Auth Context ID: 186703
Secure Channel Verifier
Sign algorithm: HMAC-MD5 (0x0077)
Seal algorithm: RC4 (0x007a)
Flags: 0000
This is the response from Active Directory:
Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(186703)
Auth type: NETLOGON Secure Channel (68)
Auth level: Packet privacy (6)
Auth pad len: 0
Auth Rsrvd: 0
Auth Context ID: 186703
Secure Channel Verifier
Sign algorithm: HMAC-MD5 (0x0077)
Seal algorithm: RC4 (0x007a)
Flags: 0000
The problem is that come April 2023, Microsoft will release a patch, AD CVE-2022-38023 patch, to start removing RC4 from Active Directory. Does it mean the communication between Cisco ISE and Microsoft Active Directory will be broken?
The Cisco bug ID CSCvo604 listed the following Known Affected Releases Cisco ISE versions:
Solved! Go to Solution.
04-04-2023 05:56 AM
1. The update on April 11th will have no impact on ISE communication to Active Directory. That was the first urgent concern.
2. We are still communicating with Active Directory on less secure protocols, that is a longer term open item that will be addressed with a security advisory and fix to ISE. Once we have a timeline for a fix we'll work internally to get a Security Advisory out that can be tracked. In the mean time it is also tracked by CSCvo60450.
It is important to note that MS is enforcing only "RequireSeal" for RPC communication and irrespective of the setting for this registry, there is no tested impact with ISE - AD Communication. If customers decide to enforce not using RC4 by setting the "RejectMd5Clients" to 1 EXPLICITLY on their own discretion, then it is bound to fail as we do not use any other encryption method apart from this as it stands today. The change that is being brought by MS on April 11 or July 11 does not have any impact on ISE-AD communication with the tests that were done so far. Please keep a track of this bug to get any further notifications/updates on the timelines of having a better encryption method than we have today. It is our priority as well.
04-04-2023 05:58 AM
Thank you for taking the time to comment.
05-08-2023 06:26 AM
Hello @Surendra , is there an update as 2023Jun and 2023-Jul-11 is approaching?
I guess an official document is preferred by Cisco to hundreds of TAC cases. (Count is 53 so far)
Thanks.
07-21-2023 02:09 AM
Any news in this matter since May? It seems that the change on the MS AD has no impact but still I am wondering if it is possible to disable RC4 at all on the ISE. Wouldn't this be a clean solution?
Or will this be implemented by Cisco in a software patch soon?
08-09-2023 10:51 PM - edited 08-09-2023 10:54 PM
Am having same confusion , can somebody please clear the confusion.
my AD team has recently deployed the path CVE-2022-38023 and says that the 5840 event id is still not impacted ( as it just categorized as Warning ) my ISE Servers are still communicating with AD on RC4 ( find latest snap )
in future if the Microsoft removes the RC4 then what do i need to do on ISE ( do i need to do it manually if yes how to do it ..?
08-09-2023 11:12 PM
As stated earlier in the thread, Cisco has an open Enhancement bug to support AES256 for this communication and the engineering team is currently working on this enhancement. More information will be available when the fix is available.
https://bst.cisco.com/bugsearch/bug/CSCvo60450
08-10-2023 06:02 AM
I don't think Cisco is taking security seriously. This issue has been going on for at least ten years now.
09-18-2023 01:51 AM
Hi @Greg Gibbs ,
According to the status page of this bug, it is now "Fixed", but there are no fixed versions released. Can you give an estimate as to when we can expect the patch?
09-18-2023 03:28 PM
According to the internal bug notes, this will be in the next patch release for all 3.x versions.
Current target ETAs (which could slip without notice) are mid-October for 3.2 p4 and end of November for 3.1 p8 and 3.3 p1.
08-11-2023 08:45 AM
Our Windows lead has said these event ids can be ignored. It is basically just saying the same thing everyone has been saying in this thread. RC4 is still going to be used by RPC_NETLOGON. Just "RequireSeal" and don't set "RejectMd5Clients".
As far as I know Microsoft doesn't have a timeline for removing RC4 from NETLOGON. If they do, ISE won't be the only system affected. Any non-Microsoft system that authenticates to AD (LINUX) will be affected.
01-01-2024 07:20 AM
Hi and Happy New Year to all! Seems like an update for the known fixed releases are now released for weeks now. But unfortunately, the recommended version 3.2P4 is not included there. Only 3.1P8 and 3.3P1.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo60450
01-01-2024 08:47 PM
@p3sysnet The bug fix did not make it in time into ISE 3.2 Patch 4 but should be there in Patch 5. Please note that we cannot disclose any release ETA here.
01-02-2024 03:55 AM
@hslai: Does it mean that in 3.2 patch-5, Cisco ISE will be using AES and NOT RC4 to communicate with Microsoft Active Directory for RPC_NETLOGON?
01-02-2024 09:23 AM
Confirmed issue is resolved in ISE 3.1 patch-8:
From ISE to Active Directory:
Secure Channel Verifier
Sign algorithm: HMAC-SHA256 (0x0013)
Seal algorithm: AES-128 (0x001a)
Flags: 0000
Sequence No: e697bb8f09964d7b
Packet Digest: a7edba5c662ccb43
Nonce: 969502ca6eec23f0
Microsoft Network Logon, NetrLogonSamLogonEx
From Active Directory back to ISE:
Auth Info: NETLOGON Secure Channel, Packet privacy, AuthContextId(64)
Auth type: NETLOGON Secure Channel (68)
Auth level: Packet privacy (6)
Auth pad len: 4
Auth Rsrvd: 0
Auth Context ID: 64
Secure Channel Verifier
Sign algorithm: HMAC-SHA256 (0x0013)
Seal algorithm: AES-128 (0x001a)
Flags: 0000
Sequence No: 4dd78fd7bee759a2
Packet Digest: 3d09bcc793447472
Nonce: dd5e957913f3438e
01-02-2024 02:16 PM
@adamscottmaster2013 Yes, as you demonstrated in your confirmation that ISE 3.1 Patch 8 negotiates and uses AES-128 as the seal algo.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide